Security+_Domain_2

Security+_Domain_2

Professional Development

35 Qs

quiz-placeholder

Similar activities

QUIZ DE EXCEL BASICO

QUIZ DE EXCEL BASICO

Professional Development

33 Qs

Konkurs "BEZPIECZNY INTERNET"

Konkurs "BEZPIECZNY INTERNET"

Professional Development

30 Qs

Seleksi Pelatihan Computer Operator Assistant

Seleksi Pelatihan Computer Operator Assistant

Professional Development

30 Qs

SR Tema 11. Cuestionario

SR Tema 11. Cuestionario

Professional Development

33 Qs

Fortnite

Fortnite

1st Grade - Professional Development

33 Qs

Montaje

Montaje

Professional Development

36 Qs

Đề tham khảo Tin học - 6

Đề tham khảo Tin học - 6

Professional Development

30 Qs

Orange Test

Orange Test

Professional Development

30 Qs

Security+_Domain_2

Security+_Domain_2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Techtorial Academy

Used 11+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following will increase cryptographic security?

High data entropy

Algorithms that require less computing power

Longer key longevity

Hashing

Answer explanation

Entropy is a measure of disorder. A plaintext will usually exhibit low entropy as it represents a message in a human language or programming language or data structure. The plaintext must be ordered for it to be intelligible to a person, computer processor, or database. One of the requirements of a strong cryptographic algorithm is to produce a disordered ciphertext. Put another way, the ciphertext must exhibit a high level of entropy. If any elements of order from the plaintext persist, it will make the ciphertext vulnerable to cryptanalysis, and the algorithm can be shown to be weak.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst is receiving several alerts per user and is trying to determine If various logins are malicious. The security analyst would like to create a baseline of normal operations and reduce noise. Which of the following actions should the security analyst perform?

Adjust the data flow from authentication sources to the SIEM.

Disable email alerting and review the SIEM directly.

Adjust the sensitivity levels of the SIEM correlation engine.

Utilize behavioral analysis to enable the SIEM's learning mode.

Answer explanation

UBA - The SIEM will first learn what is normal behavior then when a baseline is created, it will know if any of the logins are malicious. Likely determined by when and where the logins are occurring and if it's different from the baseline. This should hopefully reduce the amount of alerts occurring.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A business operations manager is concerned that a PC that is critical to business operations will have a costly hardware failure soon. The manager is looking for options to continue business operations without incurring large costs. Which of the following would mitigate the manager's concerns?

Implement a full system upgrade

Perform a physical-to-virtual migration

Install uninterruptible power supplies

Purchase cybersecurity insurance

Answer explanation

A Physical to virtual migration (P2V), is the migration of physical machines to virtual machines. Converting the PC to a VM temporarily will allow the PC to continue to its operations on a different host. The other options would require that PC be turned off so the organization would not have access to its function.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The database administration team is requesting guidance for a secure solution that will ensure confidentiality of cardholder data at rest only in certain fields in the database schema. The requirement is to substitute a sensitive data field with a non-sensitive field that is rendered useless if a data breach occurs. Which of the following is the BEST solution to meet the requirement?

Mirroring

Masking

Tokenization

Full disk encryption

Answer explanation

tokenization is mainly used to protect data at rest whereas masking is used to protect data in use

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company is looking to migrate some servers to the cloud to minimize its technology footprint. The company has 100 databases that are on premises. Which of the following solutions will require the LEAST management and support from the company?

IaaS

PaaS

SDN

SaaS

Answer explanation

In order from the least amount of management, to the most amount of management for the company:

SaaS > PaaS > IaaS > On-site

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company is considering transitioning to the cloud. The company employs individuals from various locations around the world The company does not want to increase its on-premises infrastructure blueprint and only wants to pay for additional compute power required. Which of the following solutions would BEST meet the needs of the company?

Private cloud

Hybrid environment

Managed security service provider

Hot backup site

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst has been asked by the Chief Information Security Officer to;

develop a secure method of providing centralized management of infrastructure

reduce the need to constantly replace aging end user machines

provide a consistent user desktop experience

Which of the following BEST meets these requirements?

BYOD

Mobile device management

VDI

Containerization

Answer explanation

a technology that refers to the use of virtual machines to provide and manage virtual desktops. VDI hosts desktop environments on a centralized server and deploys them to end-users on request.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?