Crackers 256-270

Crackers 256-270

Professional Development

15 Qs

quiz-placeholder

Similar activities

Security

Security

Professional Development

20 Qs

Data Analytics Quiz-TMK DPA2022

Data Analytics Quiz-TMK DPA2022

Professional Development

10 Qs

OSI Security Architecture

OSI Security Architecture

Professional Development

10 Qs

PLAL Agile Onboarding

PLAL Agile Onboarding

Professional Development

10 Qs

SDLC

SDLC

Professional Development

10 Qs

PDSB 210622

PDSB 210622

University - Professional Development

10 Qs

ITF - Quiz 13.2 - Preventing Malware Infections

ITF - Quiz 13.2 - Preventing Malware Infections

Professional Development

14 Qs

ISC2 - Chapter 1 - Module 1 - G2

ISC2 - Chapter 1 - Module 1 - G2

Professional Development

15 Qs

Crackers 256-270

Crackers 256-270

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Crackers Cyber

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.256 A security administrator needs to create a RAID configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use

(A). RA1D 0

(B). RAID1

(B). RAID1

(D). RAID 10

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.257 A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer (CFO). Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain?

(A). Open the document on an air-gapped network

(B). View the document's metadata for origin clues

(C). Search for matching file hashes on malware websites

(D). Detonate the document in an analysis sandbox

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.258 A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate device using PKI. Which of the following should the administrator configure?

(A). A captive portal

(B). PSK

(C). 802.1X

(D). WPS

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.259 A security analyst has received an alert about being sent via email. The analyst's Chief information Security Officer (CISO) has made it clear that PII must be handle with extreme care From which of the following did the alert MOST likely originate?

(A). S/MIME

(B). DLP

(C). IMAP

(D). HIDS

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.260 A security analyst needs to generate a server certificate to be used for 802.1X and secure IT Certification Guaranteed, The Easy Way! 64 RDP connections. The analyst is unsure what is required to perform the task and solicits help from a senior colleague. Which of the following is the FIRST step the senior colleague will most likely tell the analyst to perform to accomplish this task?

(A). Create an OCSP

(B). Generate a CSR

(C). Create a CRL

(D). Generate a .pfx file

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.261 An organization is tuning SIEM rules based off of threat intelligence reports. Which of the following phases of the incident response process does this scenario represent?

(A). Lessons learned

(B). Eradication

(C). Recovery

(D). Preparation

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

NO.262 An organization is repairing the damage after an incident, Which of the following controls es being implemented?

(A). Detective

(B). Preventive

(C). Corrective

(D). Compensating

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?