Security+ quiz 1-10

Security+ quiz 1-10

Professional Development

7 Qs

quiz-placeholder

Similar activities

Mothers Competition

Mothers Competition

Professional Development

10 Qs

Error Codes Vocabulary

Error Codes Vocabulary

Professional Development

12 Qs

JavaScript Quiz

JavaScript Quiz

Professional Development

10 Qs

Quiz Game

Quiz Game

KG - Professional Development

12 Qs

Quiz sobre Serviços de Rede do Azure

Quiz sobre Serviços de Rede do Azure

Professional Development

12 Qs

Quizizz

Quizizz

Professional Development

10 Qs

Trg@home 1

Trg@home 1

Professional Development

10 Qs

Topic Quiz-1 : Python Basics

Topic Quiz-1 : Python Basics

Professional Development

10 Qs

Security+ quiz 1-10

Security+ quiz 1-10

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Alejandro Hidalgo

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a backend LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface? (Choose two.)

Cross-site scripting

Data exfiltration

Poor system logging

Server-side request forgery

SQL injection

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company's data?

Containerization

Geofencing

Full-disk encryption

Remote wipe

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A Chief Security Office's (CSO's) key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO's objectives?

Use email-filtering software and centralized account management, patch high-risk systems, and restrict administration privileges on fileshares.

Purchase cyber insurance from a reputable provider to reduce expenses during an incident.

Invest in end-user awareness training to change the long-term culture and behavior of staff and executives, reducing the organization's susceptibility to phishing attacks.

Implement application whitelisting and centralized event-log management, and perform regular testing and validation of full backups

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should the engineer do to determine the issue? (Choose two.)

Perform a site survey

Deploy an FTK Imager

Create a heat map

Scan for rogue access points

Upgrade the security protocols

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee's hard disk. Which of the following should the administrator use?

dd

chmod

dnsenum

logger

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing and spear-phishing attacks have been occurring more frequently against a company's staff. Which of the following would MOST likely help mitigate this issue?

DNSSEC and DMARC

DNS query logging

Exact mail exchanger records in the DNS

The addition of DNS conditional forwarders

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?

Investigation

Containment

Recovery

Lessons learned

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?