Warriors 151-180

Warriors 151-180

Assessment

Assessment

Created by

virtual world

Computers

Professional Development

4 plays

Medium

Student preview

quiz-placeholder

30 questions

Show all answers

1.

MULTIPLE CHOICE

2 mins • 1 pt

NO.151 Which of the following is a security best practice that ensures the integrity of aggregated log files within a SIEM?

2.

MULTIPLE CHOICE

2 mins • 1 pt

NO.152 A company recently experienced an inside attack using a corporate machine that resulted in data compromise. Analysis indicated an unauthorized change to the software circumvented technological protection measures, The analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. Which of the following would provide the BEST solution?

Answer explanation

3.

MULTIPLE CHOICE

2 mins • 1 pt

NO.153 A SOC operator is receiving continuous alerts from multiple Linux systems indicating that unsuccessful SSH attempts to a functional user ID have been attempted on each one of them in a short period of time. Which of the following BEST explains this behavior?

Answer explanation

Password Spraying is a variant of what is known as a brute force attack. In a traditional brute force attack, the perpetrator attempts to gain unauthorized access to a single account by guessing the password "repeatedly" in a very short period of time.

4.

MULTIPLE SELECT

2 mins • 1 pt

NO.154 A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst include in this documentation? (Select TWO).

5.

MULTIPLE CHOICE

2 mins • 1 pt

NO.155 Which of the following can work as an authentication method and as an alerting mechanism for unauthorized access attempts?

6.

MULTIPLE CHOICE

2 mins • 1 pt

NO.156 A company is receiving emails with links to phishing sites that look very similar to the company's own website address and content. Which of the following is the BEST way for the company to mitigate this attack?

7.

MULTIPLE CHOICE

2 mins • 1 pt

NO.157 Which of the following is a risk that is specifically associated with hosting applications in the public cloud?

8.

MULTIPLE CHOICE

2 mins • 1 pt

NO.158 Which of the following is an effective tool to stop or prevent the exfiltration of data from a network?

Answer explanation

Data loss prevention (DLP) makes sure that users do not send sensitive or critical information outside the corporate network

9.

MULTIPLE CHOICE

2 mins • 1 pt

Media Image

NO.159 During a recent security incident at a multinational corporation a security analyst found the following logs for an account called user:.......Which Of the following account policies would BEST prevent attackers from logging in as user?

10.

MULTIPLE CHOICE

2 mins • 1 pt

NO.160 Which of the following secure coding techniques makes compromised code more difficult for hackers to use?

Answer explanation

In software development, obfuscation is the act of creating source or machine code that is difficult for humans or computers to understand. Like obfuscation in natural language, it may use needlessly roundabout expressions to compose statements. Programmers may deliberately obfuscate code to conceal its purpose (security through obscurity) or its logic or implicit values embedded in it, primarily, in order to prevent tampering, deter reverse engineering, or even to create a puzzle or recreational challenge for someone reading the source code. This can be done manually or by using an automated tool, the latter being the preferred technique in industry.

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers