
Warriors 151-180
Authored by virtual world
Computers
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.151 Which of the following is a security best practice that ensures the integrity of aggregated log files within a SIEM?
(A). Set up hashing on the source log file servers that complies with local regulatory requirements,
(B). Back up the aggregated log files at least two times a day or as stated by local regulatory requirements.
(C). Write protect the aggregated log files and move them to an isolated server with limited access.
(D). Back up the source log files and archive them for at least six years or in accordance with local regulatory requirements.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.152 A company recently experienced an inside attack using a corporate machine that resulted in data compromise. Analysis indicated an unauthorized change to the software circumvented technological protection measures, The analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. Which of the following would provide the BEST solution?
(A). HIPS
(B). Flm
(C). TPM
(D). DLP
Answer explanation
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.153 A SOC operator is receiving continuous alerts from multiple Linux systems indicating that unsuccessful SSH attempts to a functional user ID have been attempted on each one of them in a short period of time. Which of the following BEST explains this behavior?
(A). Rainbow table attack
(B). Password spraying
(C). Logic bomb
(D). Malware bot
Answer explanation
Password Spraying is a variant of what is known as a brute force attack. In a traditional brute force attack, the perpetrator attempts to gain unauthorized access to a single account by guessing the password "repeatedly" in a very short period of time.
4.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
NO.154 A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst include in this documentation? (Select TWO).
(A). The order of volatility
(B). A CRC32 checksum
(C). The provenance of the artifacts
(E). The date timer
(D). The vendor's name(F). A warning banne
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.155 Which of the following can work as an authentication method and as an alerting mechanism for unauthorized access attempts?
(A). Smart card
(B). push notifications
(C). Attestation service
(D). HMAC-based, one-time password
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.156 A company is receiving emails with links to phishing sites that look very similar to the company's own website address and content. Which of the following is the BEST way for the company to mitigate this attack?
(A). Create a honeynet to trap attackers who access the VPN with credentials obtained by phishing.
(B). Generate a list of domains similar to the company's own and implement a DNS sinkhole for each.
(C). Disable POP and IMAP on all Internet-facing email servers and implement SMTPS.
(D). Use an automated tool to flood the phishing websites with fake usernames and passwords.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.157 Which of the following is a risk that is specifically associated with hosting applications in the public cloud?
(A). Unsecured root accounts
(B). Zero-day
(C). Shared tenancy
(D). Insider threat
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
ReactJS Online Test
Quiz
•
Professional Development
25 questions
E-content Development Program at Fatehabad (Haryana) India
Quiz
•
Professional Development
25 questions
AP CSA Unit 1&2 Test
Quiz
•
8th Grade - Professio...
25 questions
Porty wejścia - wyjścia
Quiz
•
Professional Development
25 questions
Women Gyani Quiz Competation -2024
Quiz
•
Professional Development
25 questions
The Ultimate DSMP quiz
Quiz
•
4th Grade - Professio...
30 questions
C BASICS
Quiz
•
Professional Development
25 questions
La sicurezza delle reti
Quiz
•
Professional Development
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
44 questions
Would you rather...
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
14 questions
Valentine's Day Trivia!
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
11 questions
NFL Football logos
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development