
Warriors 151-180

Assessment
•
virtual world
•
Computers
•
Professional Development
•
4 plays
•
Medium
Student preview

30 questions
Show all answers
1.
MULTIPLE CHOICE
2 mins • 1 pt
NO.151 Which of the following is a security best practice that ensures the integrity of aggregated log files within a SIEM?
2.
MULTIPLE CHOICE
2 mins • 1 pt
NO.152 A company recently experienced an inside attack using a corporate machine that resulted in data compromise. Analysis indicated an unauthorized change to the software circumvented technological protection measures, The analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. Which of the following would provide the BEST solution?
Answer explanation
3.
MULTIPLE CHOICE
2 mins • 1 pt
NO.153 A SOC operator is receiving continuous alerts from multiple Linux systems indicating that unsuccessful SSH attempts to a functional user ID have been attempted on each one of them in a short period of time. Which of the following BEST explains this behavior?
Answer explanation
Password Spraying is a variant of what is known as a brute force attack. In a traditional brute force attack, the perpetrator attempts to gain unauthorized access to a single account by guessing the password "repeatedly" in a very short period of time.
4.
MULTIPLE SELECT
2 mins • 1 pt
NO.154 A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst include in this documentation? (Select TWO).
5.
MULTIPLE CHOICE
2 mins • 1 pt
NO.155 Which of the following can work as an authentication method and as an alerting mechanism for unauthorized access attempts?
6.
MULTIPLE CHOICE
2 mins • 1 pt
NO.156 A company is receiving emails with links to phishing sites that look very similar to the company's own website address and content. Which of the following is the BEST way for the company to mitigate this attack?
7.
MULTIPLE CHOICE
2 mins • 1 pt
NO.157 Which of the following is a risk that is specifically associated with hosting applications in the public cloud?
8.
MULTIPLE CHOICE
2 mins • 1 pt
NO.158 Which of the following is an effective tool to stop or prevent the exfiltration of data from a network?
Answer explanation
Data loss prevention (DLP) makes sure that users do not send sensitive or critical information outside the corporate network
9.
MULTIPLE CHOICE
2 mins • 1 pt
NO.159 During a recent security incident at a multinational corporation a security analyst found the following logs for an account called user:.......Which Of the following account policies would BEST prevent attackers from logging in as user?
10.
MULTIPLE CHOICE
2 mins • 1 pt
NO.160 Which of the following secure coding techniques makes compromised code more difficult for hackers to use?
Answer explanation
In software development, obfuscation is the act of creating source or machine code that is difficult for humans or computers to understand. Like obfuscation in natural language, it may use needlessly roundabout expressions to compose statements. Programmers may deliberately obfuscate code to conceal its purpose (security through obscurity) or its logic or implicit values embedded in it, primarily, in order to prevent tampering, deter reverse engineering, or even to create a puzzle or recreational challenge for someone reading the source code. This can be done manually or by using an automated tool, the latter being the preferred technique in industry.
Explore all questions with a free account
Similar Resources on Quizizz
SiberAbluka 601-630

•
Professional Development
AP CSA Unit 1&2 Test

•
8th Grade - Professio...
DSA QUIZ-2

•
Professional Development
TN +2 CSC - LESSON 1 TO 10 & 12

•
Professional Development
QUIZ-STACK_QUEUE_Jan'24

•
Professional Development
Year 9 Python: End of Unit assessment

•
Professional Development
Linux_1-25

•
Professional Development
C BASICS

•
Professional Development
Popular Resources on Quizizz
Brain Teasers

•
KG - University
Math STAAR Review

•
4th Grade
Earth Day

•
4th Grade
STAAR REVIEW - SCIENCE

•
5th Grade
Science STAAR Review! 23-24

•
5th Grade
Reading Comprehension

•
5th Grade
Types of Credit

•
9th - 12th Grade
Math STAAR Review

•
4th Grade