Comp_Sec_421-450
Quiz
•
Professional Development
•
Professional Development
•
Practice Problem
•
Easy
Hacker Eurotech
Used 5+ times
FREE Resource
Enhance your content in a minute
30 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
5 mins • 1 pt
NO.421 Which of the following function as preventive, detective, and deterrent controls to reduce
the risk of physical theft? (Select TWO).
(A). Mantraps
(B). Security guards
(C). Video surveillance
(D). Fences
(E). Bollards
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.422 A security analyst needs to perform periodic vulnerably scans on production systems. Which
of the following scan types would produce the BEST vulnerability scan report?
(A). Port
(B). Intrusive
(C). Host discovery
(D). Credentialed
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.423 Which of the following will MOST likely cause machine learning and Al-enabled systems to
operate with unintended consequences?
(A). Stored procedures
(B). Buffer overflows
(C). Data bias
(D). Code reuse
4.
MULTIPLE SELECT QUESTION
5 mins • 1 pt
NO.424 Which of the following are requirements that must be configured for PCI DSS compliance?
(Select TWO).
(A). Testing security systems and processes regularly
(B). Installing and maintaining a web proxy to protect cardholder data
(C). Assigning a unique ID to each person with computer access
(D). Encrypting transmission of cardholder data across private networks
(E). Benchmarking security awareness training for contractors
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.425 A security analyst is reviewing the following output from a system:
Which of the following is MOST likely being observed?
(A). ARP poisoning
(B). Man in the middle
(C). Denial of service
(D). DNS poisoning
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.426 Customers reported their antivirus software flagged one of the company's primary software
products as suspicious. The company's Chief Information Security Officer has tasked the developer
with determining a method to create a trust model between the software and the customer's
antivirus software. Which of the following would be the BEST solution?
(A). Code signing
(B). Domain validation
(C). Extended validation
(D). Self-signing
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.427 As part of a company's ongoing SOC maturation process, the company wants to implement
a method to share cyberthreat intelligence data with outside security partners. Which of the
following will the company MOST likely implement?
(A). TAXII
(B). TLP
(C). TTP
(D). STIX
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
25 questions
ADULT BEGINNER CHAPTER 5
Quiz
•
1st Grade - Professio...
25 questions
Synthèse installation technique de prise de courant
Quiz
•
Professional Development
25 questions
Density on the Conventional Radiograph
Quiz
•
University - Professi...
25 questions
PPG PGSD BAHASA INDONESIA
Quiz
•
Professional Development
27 questions
SULTAN BAGINDO 9
Quiz
•
Professional Development
27 questions
Google Certified Educator - Level 1
Quiz
•
Professional Development
32 questions
Traffic signs
Quiz
•
Professional Development
30 questions
PPPK PJOK NY 2
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
