Comptia Sec+ 421-450

Comptia Sec+ 421-450

Professional Development

30 Qs

quiz-placeholder

Similar activities

Latihan soal PPPK Manajerial

Latihan soal PPPK Manajerial

University - Professional Development

25 Qs

Pedagogi teori belajar

Pedagogi teori belajar

Professional Development

25 Qs

Unit 2 - Auditing

Unit 2 - Auditing

Professional Development

25 Qs

Network Pre-Test Under Cyber Closet Project

Network Pre-Test Under Cyber Closet Project

Professional Development

25 Qs

CRITICAL REASONING

CRITICAL REASONING

Professional Development

27 Qs

LIVE KALIBRASI ONLINE NOVEMBER - TELLER

LIVE KALIBRASI ONLINE NOVEMBER - TELLER

Professional Development

25 Qs

MGNF- 08

MGNF- 08

Professional Development

25 Qs

KOMPETENSI TEKNIS

KOMPETENSI TEKNIS

Professional Development

25 Qs

Comptia Sec+ 421-450

Comptia Sec+ 421-450

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

siso coc

Used 33+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

NO.421 Which of the following function as preventive, detective, and deterrent controls to reduce

the risk of physical theft? (Select TWO).

(A). Mantraps

(B). Security guards

(C). Video surveillance

(D). Fences

(E). Bollards

(F). Antivirus

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

NO.422 A security analyst needs to perform periodic vulnerably scans on production systems. Which

of the following scan types would produce the BEST vulnerability scan report?

(A). Port

(B). Intrusive

(C). Host discovery

(D). Credentialed

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

NO.423 Which of the following will MOST likely cause machine learning and Al-enabled systems to

operate with unintended consequences?

(A). Stored procedures

(B). Buffer overflows

(C). Data bias

(D). Code reuse

4.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

NO.424 Which of the following are requirements that must be configured for PCI DSS compliance?

(Select TWO). ((F). Using vendor-supplied default passwords for system passwords)

(A). Testing security systems and processes regularly

(B). Installing and maintaining a web proxy to protect cardholder data

(C). Assigning a unique ID to each person with computer access

(D). Encrypting transmission of cardholder data across private networks

(E). Benchmarking security awareness training for contractors

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Media Image

NO.425 A security analyst is reviewing the following output from a system:

Which of the following is MOST likely being observed?

(A). ARP palsoning

(B). Man in the middle

(C). Denial of service

(D). DNS poisoning

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

NO.426 Customers reported their antivirus software flagged one of the company's primary software

products as suspicious. The company's Chief Information Security Officer has tasked the developer

with determining a method to create a trust model between the software and the customer's

antivirus software. Which of the following would be the BEST solution?

(A). Code signing

(B). Domain validation

(C). Extended validation

(D). Self-signing

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

NO.427 As part of a company's ongoing SOC maturation process, the company wants to implement

a method to share cyberthreat intelligence data with outside security partners. Which of the

following will the company MOST likely implement?

(A). TAXII

(B). TLP

(C). TTP

(D). STIX

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?