SiberAbluka 601-630

Quiz
•
Computers
•
Professional Development
•
Easy

siber abluka
Used 7+ times
FREE Resource
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.601 Which of tre following would BEST identity and remediate a catatoss
event in an enterprise using third-pany, web-based services and file-sharing platanmns?
(A). SIEM
(B). CASE
(C). UTM
(D). EDR
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.602 An engineer is setting up a VDI environment for a factory tocation, and the business wants to deploy a low-cost solution to enadle users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?
(A). Laptops
(B). Containers
(C). Thin clients
(D). Workstations
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.603 A security analyst is reviewing the following command-line output:
Which of the following Is the analyst observing?
(A). IGMP spoofing
(B). URL redirection
(C). MAG address cloning
(D). DNS poisoning
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.604 Which of the following should a data owner require all personnel to sign to legally protect intellectual property?
(A). An NDA
(B). An AUP
(C). An ISA
(D). An MOU
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.605 A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?
(A). IDS solution
(B). EDR solution
(C). HIPS software solution
(D). Network DLP solution
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.606 A security analyst must determine if either SSH or Telnet is being used to log in to servers. Which of the following should the analyst use?
(A). logger
(B). Metasploit
(C). tcpdump
(D). netstat
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.607 A routine audit of medical billing claims revealed that several claims were submitted
without the subscriber's knowledge. A review of the audit logs for the medical billing company's
system indicated a company employee downloaded customer records and adjusted the direct
deposit information to a personal bank account. Which of the following does this action describe?
(A). Insider threat
(B). Social engineering
(C). Third-party risk
(D). Data breach
Create a free account and access millions of resources
Similar Resources on Wayground
22 questions
Sec+ Day1 Security Concepts & Threat Types

Quiz
•
Professional Development
22 questions
3TH sem GAT 2023

Quiz
•
Professional Development
25 questions
CN-First Test

Quiz
•
Professional Development
23 questions
ICEBERG_Assessment_Pre

Quiz
•
University - Professi...
22 questions
CISSP Asset Quiz

Quiz
•
Professional Development
24 questions
#01.01 Foundations of Cybersecurity Module 1

Quiz
•
Professional Development
23 questions
Chapter 9 Quiz

Quiz
•
Professional Development
22 questions
Day 4 - Security I - Day 3 Review - 1st Review

Quiz
•
Professional Development
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
10 questions
Chaffey

Quiz
•
9th - 12th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
22 questions
6-8 Digital Citizenship Review

Quiz
•
6th - 8th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade