NO.601 Which of tre following would BEST identity and remediate a catatoss
event in an enterprise using third-pany, web-based services and file-sharing platanmns?
SiberAbluka 601-630
Quiz
•
Computers
•
Professional Development
•
Easy
siber abluka
Used 7+ times
FREE Resource
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.601 Which of tre following would BEST identity and remediate a catatoss
event in an enterprise using third-pany, web-based services and file-sharing platanmns?
(A). SIEM
(B). CASE
(C). UTM
(D). EDR
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.602 An engineer is setting up a VDI environment for a factory tocation, and the business wants to deploy a low-cost solution to enadle users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?
(A). Laptops
(B). Containers
(C). Thin clients
(D). Workstations
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.603 A security analyst is reviewing the following command-line output:
Which of the following Is the analyst observing?
(A). IGMP spoofing
(B). URL redirection
(C). MAG address cloning
(D). DNS poisoning
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.604 Which of the following should a data owner require all personnel to sign to legally protect intellectual property?
(A). An NDA
(B). An AUP
(C). An ISA
(D). An MOU
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.605 A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?
(A). IDS solution
(B). EDR solution
(C). HIPS software solution
(D). Network DLP solution
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.606 A security analyst must determine if either SSH or Telnet is being used to log in to servers. Which of the following should the analyst use?
(A). logger
(B). Metasploit
(C). tcpdump
(D). netstat
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.607 A routine audit of medical billing claims revealed that several claims were submitted
without the subscriber's knowledge. A review of the audit logs for the medical billing company's
system indicated a company employee downloaded customer records and adjusted the direct
deposit information to a personal bank account. Which of the following does this action describe?
(A). Insider threat
(B). Social engineering
(C). Third-party risk
(D). Data breach
25 questions
SEC+ 001-025
Quiz
•
Professional Development
24 questions
Salesforce Daily Quiz
Quiz
•
Professional Development
21 questions
CPA MS-Office Hotkeys Quiz
Quiz
•
8th Grade - Professio...
22 questions
A+ - 17B - Configure Browser Security
Quiz
•
Professional Development
25 questions
7 ÔT Giữa Hk 1 tin học 7 23 - 24
Quiz
•
Professional Development
25 questions
CompTIA Security+ Quiz
Quiz
•
Professional Development
30 questions
1-30 Quiz
Quiz
•
Professional Development
21 questions
A+ - 18A - Configure mobile OS security
Quiz
•
Professional Development
15 questions
Multiplication Facts
Quiz
•
4th Grade
20 questions
Math Review - Grade 6
Quiz
•
6th Grade
20 questions
math review
Quiz
•
4th Grade
5 questions
capitalization in sentences
Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance
Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions
Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines
Quiz
•
Professional Development
12 questions
Dividing Fractions
Quiz
•
6th Grade