SiberAbluka 601-630

SiberAbluka 601-630

Professional Development

26 Qs

quiz-placeholder

Similar activities

APCSP review

APCSP review

Professional Development

25 Qs

Collections

Collections

University - Professional Development

30 Qs

105 5-6 Review

105 5-6 Review

10th Grade - Professional Development

21 Qs

Internet Technologies(Quiz 3)

Internet Technologies(Quiz 3)

Professional Development

21 Qs

CySA Review 7 & 8

CySA Review 7 & 8

Professional Development

21 Qs

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

8th Grade - Professional Development

21 Qs

Enterprise Mobility + Security

Enterprise Mobility + Security

Professional Development

24 Qs

SiberAbluka 601-630

SiberAbluka 601-630

Assessment

Quiz

Computers

Professional Development

Easy

Created by

siber abluka

Used 7+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.601 Which of tre following would BEST identity and remediate a catatoss

event in an enterprise using third-pany, web-based services and file-sharing platanmns?

(A). SIEM

(B). CASE

(C). UTM

(D). EDR

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.602 An engineer is setting up a VDI environment for a factory tocation, and the business wants to deploy a low-cost solution to enadle users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?

(A). Laptops

(B). Containers

(C). Thin clients

(D). Workstations

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

NO.603 A security analyst is reviewing the following command-line output:

Which of the following Is the analyst observing?

(A). IGMP spoofing

(B). URL redirection

(C). MAG address cloning

(D). DNS poisoning

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.604 Which of the following should a data owner require all personnel to sign to legally protect intellectual property?

(A). An NDA

(B). An AUP

(C). An ISA

(D). An MOU

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.605 A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?

(A). IDS solution

(B). EDR solution

(C). HIPS software solution

(D). Network DLP solution

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.606 A security analyst must determine if either SSH or Telnet is being used to log in to servers. Which of the following should the analyst use?

(A). logger

(B). Metasploit

(C). tcpdump

(D). netstat

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.607 A routine audit of medical billing claims revealed that several claims were submitted

without the subscriber's knowledge. A review of the audit logs for the medical billing company's

system indicated a company employee downloaded customer records and adjusted the direct

deposit information to a personal bank account. Which of the following does this action describe?

(A). Insider threat

(B). Social engineering

(C). Third-party risk

(D). Data breach

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?