Security+_Domain_2
Quiz
•
Computers
•
Professional Development
•
Medium
Techtorial Academy
Used 11+ times
FREE Resource
Enhance your content
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following will increase cryptographic security?
High data entropy
Algorithms that require less computing power
Longer key longevity
Hashing
Answer explanation
Entropy is a measure of disorder. A plaintext will usually exhibit low entropy as it represents a message in a human language or programming language or data structure. The plaintext must be ordered for it to be intelligible to a person, computer processor, or database. One of the requirements of a strong cryptographic algorithm is to produce a disordered ciphertext. Put another way, the ciphertext must exhibit a high level of entropy. If any elements of order from the plaintext persist, it will make the ciphertext vulnerable to cryptanalysis, and the algorithm can be shown to be weak.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst is receiving several alerts per user and is trying to determine If various logins are malicious. The security analyst would like to create a baseline of normal operations and reduce noise. Which of the following actions should the security analyst perform?
Adjust the data flow from authentication sources to the SIEM.
Disable email alerting and review the SIEM directly.
Adjust the sensitivity levels of the SIEM correlation engine.
Utilize behavioral analysis to enable the SIEM's learning mode.
Answer explanation
UBA - The SIEM will first learn what is normal behavior then when a baseline is created, it will know if any of the logins are malicious. Likely determined by when and where the logins are occurring and if it's different from the baseline. This should hopefully reduce the amount of alerts occurring.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A business operations manager is concerned that a PC that is critical to business operations will have a costly hardware failure soon. The manager is looking for options to continue business operations without incurring large costs. Which of the following would mitigate the manager's concerns?
Implement a full system upgrade
Perform a physical-to-virtual migration
Install uninterruptible power supplies
Purchase cybersecurity insurance
Answer explanation
A Physical to virtual migration (P2V), is the migration of physical machines to virtual machines. Converting the PC to a VM temporarily will allow the PC to continue to its operations on a different host. The other options would require that PC be turned off so the organization would not have access to its function.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The database administration team is requesting guidance for a secure solution that will ensure confidentiality of cardholder data at rest only in certain fields in the database schema. The requirement is to substitute a sensitive data field with a non-sensitive field that is rendered useless if a data breach occurs. Which of the following is the BEST solution to meet the requirement?
Mirroring
Masking
Tokenization
Full disk encryption
Answer explanation
tokenization is mainly used to protect data at rest whereas masking is used to protect data in use
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company is looking to migrate some servers to the cloud to minimize its technology footprint. The company has 100 databases that are on premises. Which of the following solutions will require the LEAST management and support from the company?
IaaS
PaaS
SDN
SaaS
Answer explanation
In order from the least amount of management, to the most amount of management for the company:
SaaS > PaaS > IaaS > On-site
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company is considering transitioning to the cloud. The company employs individuals from various locations around the world The company does not want to increase its on-premises infrastructure blueprint and only wants to pay for additional compute power required. Which of the following solutions would BEST meet the needs of the company?
Private cloud
Hybrid environment
Managed security service provider
Hot backup site
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst has been asked by the Chief Information Security Officer to;
•develop a secure method of providing centralized management of infrastructure
•reduce the need to constantly replace aging end user machines
•provide a consistent user desktop experience
Which of the following BEST meets these requirements?
BYOD
Mobile device management
VDI
Containerization
Answer explanation
a technology that refers to the use of virtual machines to provide and manage virtual desktops. VDI hosts desktop environments on a centralized server and deploys them to end-users on request.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
35 questions
Quiz dla nowego trenera
Quiz
•
Professional Development
40 questions
Cyber Security
Quiz
•
Professional Development
30 questions
SQL
Quiz
•
Professional Development
40 questions
La Capa Física y los Sistemas de Cableado Estructurado
Quiz
•
Professional Development
40 questions
KJD 10 Siniu
Quiz
•
Professional Development
40 questions
UAS ASJ KLS 11 SINIU
Quiz
•
Professional Development
31 questions
A+ Pretest 1: 1/3
Quiz
•
9th Grade - Professio...
40 questions
311-350
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
11 questions
NEASC Extended Advisory
Lesson
•
9th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade
