SiberAbluka 601-630

SiberAbluka 601-630

Professional Development

26 Qs

quiz-placeholder

Similar activities

LENGUAJE DE MODELADO UNIFICADO UML

LENGUAJE DE MODELADO UNIFICADO UML

Professional Development

22 Qs

SharePoint Part 2

SharePoint Part 2

Professional Development

22 Qs

Final Assessment June 29 Class

Final Assessment June 29 Class

Professional Development

25 Qs

Cohort 1 : Test

Cohort 1 : Test

Professional Development

21 Qs

Quiz 3.1

Quiz 3.1

Professional Development

21 Qs

Ôn tập kiểm tra học kỳ 1 môn Tin học 7

Ôn tập kiểm tra học kỳ 1 môn Tin học 7

1st Grade - Professional Development

24 Qs

In-Sight 9912

In-Sight 9912

Professional Development

22 Qs

SiberAbluka 601-630

SiberAbluka 601-630

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

siber abluka

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.601 Which of tre following would BEST identity and remediate a catatoss

event in an enterprise using third-pany, web-based services and file-sharing platanmns?

(A). SIEM

(B). CASE

(C). UTM

(D). EDR

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.602 An engineer is setting up a VDI environment for a factory tocation, and the business wants to deploy a low-cost solution to enadle users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?

(A). Laptops

(B). Containers

(C). Thin clients

(D). Workstations

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

NO.603 A security analyst is reviewing the following command-line output:

Which of the following Is the analyst observing?

(A). IGMP spoofing

(B). URL redirection

(C). MAG address cloning

(D). DNS poisoning

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.604 Which of the following should a data owner require all personnel to sign to legally protect intellectual property?

(A). An NDA

(B). An AUP

(C). An ISA

(D). An MOU

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.605 A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?

(A). IDS solution

(B). EDR solution

(C). HIPS software solution

(D). Network DLP solution

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.606 A security analyst must determine if either SSH or Telnet is being used to log in to servers. Which of the following should the analyst use?

(A). logger

(B). Metasploit

(C). tcpdump

(D). netstat

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.607 A routine audit of medical billing claims revealed that several claims were submitted

without the subscriber's knowledge. A review of the audit logs for the medical billing company's

system indicated a company employee downloaded customer records and adjusted the direct

deposit information to a personal bank account. Which of the following does this action describe?

(A). Insider threat

(B). Social engineering

(C). Third-party risk

(D). Data breach

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?