Search Header Logo

61-90

Authored by siso coc

Professional Development

KG

Used 11+ times

61-90
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.61 After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?

(A).  A DMZ

(B). A VPN

(C). A VLAN

(D). An ACL

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

NO.62 A security analyst needs to determine how an attacker was able to use User3 to gain a foothold within a company's network. The company's lockout policy requires that an account be locked out for a minimum of 15 minutes after three unsuccessful attempts. While reviewing the log files, the analyst discovers the following:

Which of the following attacks MOST likely occurred?

(A). Dictionary

(B). Credential-stuffing

(C). Password-spraying

(D). Brute-force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.63 An organization is concerned that its hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?

(A). hping3 -S corsptia.org -p 80

(B). nc -1 -v comptia.org -p 80

(C). nmap comptia.org -p 80 -sV

(D). nslookup -port=80 comptia.org

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.64 A company uses wireless tor all laptops and keeps a very detailed record of its assets, along with a comprehensive list of devices that are authorized to be on the wireless network. The Chief Information Officer (CIO) is concerned about a script kiddie potentially using an unauthorized device to brute force the wireless PSK and obtain access to the internal network. Which of the following should the company implement to BEST prevent this from occurring?

(A). A BPDU guard

(B). WPA-EAP

(C). IP filtering

(D). A WIDS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.65 A security analyst wants to verify that a client-server (non-web) application is sending encrypted traffic.

Which of the following should the analyst use?

(A). openssl

(B). hping

(C). netcat

(D). tcpdump

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

NO.66 A user enters a password to log in to a workstation and is then prompted to enter an authentication code.

Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).

(A). Something you know

(B). Something you have

(C). Somewhere you are

(D). Someone you are

(E).Something you can do

(F). Something you are

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.67 A financial institution would like to store its customer data in a cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would BEST meet the requirement?

(A). Asymmetric

(B). Symmetric

(C). Homomorphic

(D). Ephemeral

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?