Crackers 256-270

Crackers 256-270

Professional Development

15 Qs

quiz-placeholder

Similar activities

Presentador EMAZE

Presentador EMAZE

Professional Development

10 Qs

Fibra Óptica, Medios Inalámbricos, Cableado Estructurado

Fibra Óptica, Medios Inalámbricos, Cableado Estructurado

Professional Development

20 Qs

KOE034: Sensors and Instruments

KOE034: Sensors and Instruments

Professional Development

11 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

OWASP Top 10

OWASP Top 10

Professional Development

10 Qs

MS Excel practice

MS Excel practice

Professional Development

18 Qs

UDC 2022

UDC 2022

Professional Development

10 Qs

Mastering KineMaster

Mastering KineMaster

Professional Development

10 Qs

Crackers 256-270

Crackers 256-270

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Crackers Cyber

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.256 A security administrator needs to create a RAID configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use

(A). RA1D 0

(B). RAID1

(B). RAID1

(D). RAID 10

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.257 A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer (CFO). Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain?

(A). Open the document on an air-gapped network

(B). View the document's metadata for origin clues

(C). Search for matching file hashes on malware websites

(D). Detonate the document in an analysis sandbox

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.258 A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate device using PKI. Which of the following should the administrator configure?

(A). A captive portal

(B). PSK

(C). 802.1X

(D). WPS

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.259 A security analyst has received an alert about being sent via email. The analyst's Chief information Security Officer (CISO) has made it clear that PII must be handle with extreme care From which of the following did the alert MOST likely originate?

(A). S/MIME

(B). DLP

(C). IMAP

(D). HIDS

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.260 A security analyst needs to generate a server certificate to be used for 802.1X and secure IT Certification Guaranteed, The Easy Way! 64 RDP connections. The analyst is unsure what is required to perform the task and solicits help from a senior colleague. Which of the following is the FIRST step the senior colleague will most likely tell the analyst to perform to accomplish this task?

(A). Create an OCSP

(B). Generate a CSR

(C). Create a CRL

(D). Generate a .pfx file

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.261 An organization is tuning SIEM rules based off of threat intelligence reports. Which of the following phases of the incident response process does this scenario represent?

(A). Lessons learned

(B). Eradication

(C). Recovery

(D). Preparation

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.262 An organization is repairing the damage after an incident, Which of the following controls es being implemented?

(A). Detective

(B). Preventive

(C). Corrective

(D). Compensating

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?