CompTIA Sec+

Quiz
•
Computers
•
University - Professional Development
•
Hard
Miftah Rahman
Used 119+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of the following access control schemes would be BEST for the company to implement?
Discretionary
Rule-based
Role-based
Mandatory
2.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?
Install a NIDS device at the boundary.
Segment the network with firewalls.
Update all antivirus signatures daily.
Implement application blacklisting.
3.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office. Priority must be given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?
Nmap
Heat Map
Network DIagrams
Wireshark
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?
Incident Response
COmmunications
Disaster Recovery
Data Retention
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy?
Mobile device management
Full-device encryption
Remote wipe
Biometrics
6.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?
Predictability
Key STretching
Salting
Hashing
7.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider. Which of the following risk management strategies is this an example of?
Acceptance
Mitigation
Avoidance
Transference
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
IT for Managers - M3

Quiz
•
University
20 questions
Business Finance Endterm Quiz #3

Quiz
•
University
18 questions
software engineering quiz

Quiz
•
KG - University
19 questions
INTRODUCTION TO ITIL

Quiz
•
Professional Development
20 questions
Cybersecurity Essentials Chapter 6 Review

Quiz
•
9th Grade - University
20 questions
Financial Management Midterm Quiz #2

Quiz
•
University
15 questions
What is Game Design?

Quiz
•
3rd Grade - University
15 questions
security+ (601)

Quiz
•
9th Grade - Professio...
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
10 questions
Chaffey

Quiz
•
9th - 12th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
22 questions
6-8 Digital Citizenship Review

Quiz
•
6th - 8th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
15 questions
Quiz to Highlight Q types & other great features in Wayground

Quiz
•
Professional Development
8 questions
Different Question Types

Quiz
•
Professional Development
20 questions
Company Logos

Quiz
•
University