quiz 3

quiz 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

SLOT 1: Foundation 1

SLOT 1: Foundation 1

Professional Development

10 Qs

Sec+ CH.1 Review Test

Sec+ CH.1 Review Test

Professional Development

15 Qs

Pre Test CTIA

Pre Test CTIA

Professional Development

10 Qs

CAMBRIDGE - A Level -IT- Networks - Satellite Communications

CAMBRIDGE - A Level -IT- Networks - Satellite Communications

12th Grade - Professional Development

10 Qs

SEC+ Ch.10 Review Test

SEC+ Ch.10 Review Test

Professional Development

15 Qs

Sec+ Quiz - 2

Sec+ Quiz - 2

Professional Development

15 Qs

System Ethical Hacking

System Ethical Hacking

Professional Development

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

quiz 3

quiz 3

Assessment

Quiz

Science, Computers

Professional Development

Hard

Created by

teeviraj janki

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

20 sec • 20 pts

Which of the following are unique characteristics of

a rainbow table attack but not of a brute-force

attack? (Select two.)

This attack doesn’t require the hashed passwords

This attack involves precomputed hash values

This attack must be conducted online

This attack circumvents account lockout

restrictions

2.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

You decided to implement TLS encryption between

two servers to protect the data being transferred

between them. Which of the following states of data

best represents what you are putting in place?

data in rest

data in transit

data in use

data in processing

3.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

Media Image

A security analyst is reviewing the following attack log output:

Which of the following types of attacks does this MOST likely represent?

rainbow attack

brute force

password spraying

dictionary

4.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

A major clothing company recently lost a large amount of proprietary information. The security officer must find a solution to ensure this never happens again. Which of the following is the BEST technical implementation to prevent this from happening again?

Configure DLP solutions

Enable role-based

Mandate job rotation

Implement content filters

5.

MULTIPLE SELECT QUESTION

20 sec • 20 pts

Your organization has been moving new

applications from the testing environment directly

to production, but lately there have been many

issues. You have been asked to help mitigate these

issues. Which of the following are the most

appropriate? (Select two.)

Move the code to both production environments

to troubleshoot on one in case the other fails.

Set up a parallel production environment.

Set up a staging environment to closely match the

production environment.

Move the code to staging prior to moving it to

production.

6.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

The IT department on-site developer has been with the team for many years. Each time an application is released, the security team is able to identify multiple vulnerabilities. Which of the following would BEST help the team ensure the application is ready to be released to production?

Limit the use of third-party libraries

Prevent data exposure queries

Obfuscate the source code

Submit the application to QA before releasing it.

7.

MULTIPLE CHOICE QUESTION

20 sec • 20 pts

Which of the following is an example of two-factor

authentication?

Website requiring username and password

ATM requiring credit card and PIN

Website requiring a one-time token code to log in

ATM requiring facial recognition

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?