Sec+ Quiz - 2

Sec+ Quiz - 2

Professional Development

15 Qs

quiz-placeholder

Similar activities

SOF Day 2 Review

SOF Day 2 Review

Professional Development

11 Qs

SIRI Day 2 Review

SIRI Day 2 Review

Professional Development

11 Qs

Securing Source Code

Securing Source Code

Professional Development

10 Qs

Online Security

Online Security

Professional Development

10 Qs

Security+ Lesson 8

Security+ Lesson 8

Professional Development

10 Qs

Chapter 6 Quiz

Chapter 6 Quiz

Professional Development

20 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

Professional Development

10 Qs

Sorular 11-20

Sorular 11-20

Professional Development

10 Qs

Sec+ Quiz - 2

Sec+ Quiz - 2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Isabella S

Used 30+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization has developed an application that needs a patch to fix a critical vulnerability. In which of the following environments should the patch be deployed LAST?

Test

Staging

Development

Production

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the MOST effective control against zero-day vulnerabilities?

Network segmentation

Patch management

Intrusion prevention system

Multiple vulnerability scanners

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An engineer wants to inspect traffic to a cluster of web servers in a cloud environment. Which of the following solutions should the engineer implement?

Proxy server

WAF

Load balancer

VPN

4.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

A Chief Information Security Officer has defined resiliency requirements for a new data center architecture. The requirements are as follows:

• Critical file shares will remain accessible during and after a natural disaster.

• Five percent of hard disks can fail at any given time without impacting the data.

• Systems will be forced to shut down gracefully when battery levels are below 20%.

Which of the following are required to BEST meet these objectives? (Select THREE)

UPS

RAID

Geographic dispersal

Redundant power supplies

Fiber switching

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following actions would be recommended to improve an incident response process?

Train the team to identify the difference between events and incidents

Modify access so the IT team has full access to the compromised assets

Contact the authorities if a cybercrime is suspected

Restrict communication surrounding the response to the IT team

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security proposal was set up to track requests for remote access by creating a baseline of the users' common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which of the following should be configured in order to deploy the proposal?

Context-aware authentication

Simultaneous authentication of equals

Extensive authentication protocol EAP

Agentless network access control

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?

Perform a mathematical operation on the passwords that will convert them into vague strings.

Add extra data to the passwords so their length is increased, making them harder to brute force.

Store all passwords in the system in a rainbow table that has a centralized location.

Enforce the use of one-time passwords that are changed for every login session.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?