
Security+_Domain_2
Authored by Techtorial Academy
Computers
Professional Development
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following will increase cryptographic security?
High data entropy
Algorithms that require less computing power
Longer key longevity
Hashing
Answer explanation
Entropy is a measure of disorder. A plaintext will usually exhibit low entropy as it represents a message in a human language or programming language or data structure. The plaintext must be ordered for it to be intelligible to a person, computer processor, or database. One of the requirements of a strong cryptographic algorithm is to produce a disordered ciphertext. Put another way, the ciphertext must exhibit a high level of entropy. If any elements of order from the plaintext persist, it will make the ciphertext vulnerable to cryptanalysis, and the algorithm can be shown to be weak.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst is receiving several alerts per user and is trying to determine If various logins are malicious. The security analyst would like to create a baseline of normal operations and reduce noise. Which of the following actions should the security analyst perform?
Adjust the data flow from authentication sources to the SIEM.
Disable email alerting and review the SIEM directly.
Adjust the sensitivity levels of the SIEM correlation engine.
Utilize behavioral analysis to enable the SIEM's learning mode.
Answer explanation
UBA - The SIEM will first learn what is normal behavior then when a baseline is created, it will know if any of the logins are malicious. Likely determined by when and where the logins are occurring and if it's different from the baseline. This should hopefully reduce the amount of alerts occurring.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A business operations manager is concerned that a PC that is critical to business operations will have a costly hardware failure soon. The manager is looking for options to continue business operations without incurring large costs. Which of the following would mitigate the manager's concerns?
Implement a full system upgrade
Perform a physical-to-virtual migration
Install uninterruptible power supplies
Purchase cybersecurity insurance
Answer explanation
A Physical to virtual migration (P2V), is the migration of physical machines to virtual machines. Converting the PC to a VM temporarily will allow the PC to continue to its operations on a different host. The other options would require that PC be turned off so the organization would not have access to its function.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The database administration team is requesting guidance for a secure solution that will ensure confidentiality of cardholder data at rest only in certain fields in the database schema. The requirement is to substitute a sensitive data field with a non-sensitive field that is rendered useless if a data breach occurs. Which of the following is the BEST solution to meet the requirement?
Mirroring
Masking
Tokenization
Full disk encryption
Answer explanation
tokenization is mainly used to protect data at rest whereas masking is used to protect data in use
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company is looking to migrate some servers to the cloud to minimize its technology footprint. The company has 100 databases that are on premises. Which of the following solutions will require the LEAST management and support from the company?
IaaS
PaaS
SDN
SaaS
Answer explanation
In order from the least amount of management, to the most amount of management for the company:
SaaS > PaaS > IaaS > On-site
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company is considering transitioning to the cloud. The company employs individuals from various locations around the world The company does not want to increase its on-premises infrastructure blueprint and only wants to pay for additional compute power required. Which of the following solutions would BEST meet the needs of the company?
Private cloud
Hybrid environment
Managed security service provider
Hot backup site
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst has been asked by the Chief Information Security Officer to;
•develop a secure method of providing centralized management of infrastructure
•reduce the need to constantly replace aging end user machines
•provide a consistent user desktop experience
Which of the following BEST meets these requirements?
BYOD
Mobile device management
VDI
Containerization
Answer explanation
a technology that refers to the use of virtual machines to provide and manage virtual desktops. VDI hosts desktop environments on a centralized server and deploys them to end-users on request.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
32 questions
TEMA 7 y 9. MONT. PROFESOR
Quiz
•
KG - Professional Dev...
31 questions
Year 7 Computer Science Baseline
Quiz
•
KG - Professional Dev...
40 questions
QUIZZ KJD - PERAWATAN, PERMASALAHAN DAN PERBAIKAN PC
Quiz
•
KG - Professional Dev...
40 questions
Foundation_Batch_2025
Quiz
•
Professional Development
30 questions
UF0319 Repaso todo
Quiz
•
Professional Development
30 questions
Comptia Security+ Understanding Application Attacks and security
Quiz
•
Professional Development
40 questions
CFGB La placa base
Quiz
•
Professional Development
30 questions
Modulo 6 - Evaluacion
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development