An organization has developed an application that needs a patch to fix a critical vulnerability. In which of the following environments should the patch be deployed LAST?
Sec+ Quiz - 2

Quiz
•
Computers
•
Professional Development
•
Hard
Isabella S
Used 30+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Test
Staging
Development
Production
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is the MOST effective control against zero-day vulnerabilities?
Network segmentation
Patch management
Intrusion prevention system
Multiple vulnerability scanners
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An engineer wants to inspect traffic to a cluster of web servers in a cloud environment. Which of the following solutions should the engineer implement?
Proxy server
WAF
Load balancer
VPN
4.
MULTIPLE SELECT QUESTION
2 mins • 3 pts
A Chief Information Security Officer has defined resiliency requirements for a new data center architecture. The requirements are as follows:
• Critical file shares will remain accessible during and after a natural disaster.
• Five percent of hard disks can fail at any given time without impacting the data.
• Systems will be forced to shut down gracefully when battery levels are below 20%.
Which of the following are required to BEST meet these objectives? (Select THREE)
UPS
RAID
Geographic dispersal
Redundant power supplies
Fiber switching
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following actions would be recommended to improve an incident response process?
Train the team to identify the difference between events and incidents
Modify access so the IT team has full access to the compromised assets
Contact the authorities if a cybercrime is suspected
Restrict communication surrounding the response to the IT team
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security proposal was set up to track requests for remote access by creating a baseline of the users' common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which of the following should be configured in order to deploy the proposal?
Context-aware authentication
Simultaneous authentication of equals
Extensive authentication protocol EAP
Agentless network access control
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?
Perform a mathematical operation on the passwords that will convert them into vague strings.
Add extra data to the passwords so their length is increased, making them harder to brute force.
Store all passwords in the system in a rainbow table that has a centralized location.
Enforce the use of one-time passwords that are changed for every login session.
Create a free account and access millions of resources
Similar Resources on Quizizz
11 questions
Password Safety & Security

Quiz
•
KG - Professional Dev...
14 questions
cyber security

Quiz
•
KG - Professional Dev...
11 questions
ICTDBS506- HASHES, SALTS, PEPPERS Quiz

Quiz
•
Professional Development
15 questions
AI Cybersecurity Quiz

Quiz
•
Professional Development
14 questions
isc2 sample questions

Quiz
•
Professional Development
10 questions
ITF - Quiz 14.5 - Password Security and Management

Quiz
•
Professional Development
10 questions
IT General Control

Quiz
•
Professional Development
17 questions
MOC 20744C-Securing Windows Server 2016 - Part 2

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade