SiberAbluka 601-630

SiberAbluka 601-630

Professional Development

26 Qs

quiz-placeholder

Similar activities

BTEC Coding & Logic

BTEC Coding & Logic

12th Grade - Professional Development

24 Qs

A+ - 18A - Configure mobile OS security

A+ - 18A - Configure mobile OS security

Professional Development

21 Qs

SEC+ 001-025

SEC+ 001-025

Professional Development

25 Qs

IS404 - SY2023

IS404 - SY2023

Professional Development

21 Qs

Linux_1-25

Linux_1-25

Professional Development

25 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

21 Qs

15 days of code quiz 2

15 days of code quiz 2

11th Grade - Professional Development

22 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

21 Qs

SiberAbluka 601-630

SiberAbluka 601-630

Assessment

Quiz

Computers

Professional Development

Easy

Created by

siber abluka

Used 7+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.601 Which of tre following would BEST identity and remediate a catatoss

event in an enterprise using third-pany, web-based services and file-sharing platanmns?

(A). SIEM

(B). CASE

(C). UTM

(D). EDR

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.602 An engineer is setting up a VDI environment for a factory tocation, and the business wants to deploy a low-cost solution to enadle users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?

(A). Laptops

(B). Containers

(C). Thin clients

(D). Workstations

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

NO.603 A security analyst is reviewing the following command-line output:

Which of the following Is the analyst observing?

(A). IGMP spoofing

(B). URL redirection

(C). MAG address cloning

(D). DNS poisoning

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.604 Which of the following should a data owner require all personnel to sign to legally protect intellectual property?

(A). An NDA

(B). An AUP

(C). An ISA

(D). An MOU

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.605 A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?

(A). IDS solution

(B). EDR solution

(C). HIPS software solution

(D). Network DLP solution

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.606 A security analyst must determine if either SSH or Telnet is being used to log in to servers. Which of the following should the analyst use?

(A). logger

(B). Metasploit

(C). tcpdump

(D). netstat

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.607 A routine audit of medical billing claims revealed that several claims were submitted

without the subscriber's knowledge. A review of the audit logs for the medical billing company's

system indicated a company employee downloaded customer records and adjusted the direct

deposit information to a personal bank account. Which of the following does this action describe?

(A). Insider threat

(B). Social engineering

(C). Third-party risk

(D). Data breach

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?