241-270

241-270

KG

30 Qs

quiz-placeholder

Similar activities

The Age of Industrialisation

The Age of Industrialisation

10th Grade

25 Qs

Digital Wellness & Safety

Digital Wellness & Safety

6th Grade

30 Qs

Inquiries, Investigation and Immersion

Inquiries, Investigation and Immersion

12th Grade

25 Qs

MGNF- 08

MGNF- 08

Professional Development

25 Qs

Exploration and Colonization Era Quiz

Exploration and Colonization Era Quiz

8th Grade

25 Qs

List in Python

List in Python

11th Grade

25 Qs

DCP #1 Review Old STAAR Questions 21-22

DCP #1 Review Old STAAR Questions 21-22

8th Grade

26 Qs

Ch. 2 Test Study Guide

Ch. 2 Test Study Guide

4th Grade

26 Qs

241-270

241-270

Assessment

Quiz

Computers, Social Studies, Professional Development

KG

Easy

Created by

siso coc

Used 10+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.241 Several employees have noticed other bystanders can clearly observe a terminal where

passcodes are being entered. Which of the following can be eliminated with the use of a privacy

screen?

(A). Shoulder surfing

(B). Spear phishing

(C). Impersonation attack

(D). Card cloning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.242 A security analyst needs to complete an assessment. The analyst is logged into a server and

must use native tools to map services running on it to the server's listening ports. Which of the

following tools can BEST accomplish this talk?

(A). Netcat

(B). Netstat

(C). Nmap

(D). Nessus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.243 A workwide manufacturing company has been experiencing email account compromised. In

one incident, a user logged in from the corporate office in France, but then seconds later, the same

user account attempted a login from Brazil. Which of the following account policies would BEST

prevent this type of attack?

(A). Network location

(B). Impossible travel time

(C). Geolocation

(D). Geofencing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.244 A user recently attended an exposition and received some digital promotional materials The

user later noticed blue boxes popping up and disappearing on the computer, and reported receiving

several spam emails, which the user did not open Which of the following is MOST likely the cause of

the reported issue?

(A). There was a drive-by download of malware

(B). The user installed a cryptominer

(C). The OS was corrupted

(D). There was malicious code on the USB drive

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.245 An organization is concerned about intellectual property theft by employee who leave the

organization. Which of the following will be organization MOST likely implement?

(A). CBT

(B). NDA

(C). MOU

(D). AUP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

NO.246 An end user reports a computer has been acting slower than normal for a few weeks. During

an investigation, an analyst determines the system is sending the user's email address and a ten-digit

number to an IP address once a day. The only recent log entry regarding the user's computer is the

following:

Which of the following is the MOST likely cause of the issue?

(A). The end user purchased and installed a PUP from a web browser

(B). A bot on the computer is brute forcing passwords against a website

(C). A hacker is attempting to exfiltrate sensitive data

(D). Ransomware is communicating with a command-and-control server.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.247 An organization would like to remediate the risk associated with its cloud service provider

not meeting its advertised 99.999% availability metrics. Which of the following should the

organization consult for the exact requirements for the cloud provider?

(A). SLA

(B). BPA

(C). NDA

(D). MOU

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?