Search Header Logo

Sorular 11-20

Authored by Bny *

Computers

Professional Development

Used 2+ times

Sorular 11-20
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

NO.11 Which of the following control types is focused primarily on reducing risk before an incident occurs?

(A). Preventive

(B). Deterrent

(C). Corrective

(D). Detective

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

NO.12 An organization has developed an application that needs a patch to fix a critical vulnerability In which of the following environments should the patch be deployed LAST?

(A). Test

(B). Staging

(C). Development

(D). Production

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

NO.13 Which of the following control Types would be BEST to use in an accounting department to reduce losses from fraudulent transactions?

(A). Recovery

(B). Deterrent

(C). Corrective

(D). Detective

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

NO.14 Which of the following risk management strategies would an organization use to maintain a legacy system with known risks for operational purposes?

(A). Acceptance

(B). Transference

(C). Avoidance

(D). Mitigation

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

NO.15 A social media company based in North America is looking to expand into new global markets and needs to maintain compliance with international standards With which of the following is the company's data protection officer MOST likely concerned''

(A). NIST Framework

(B). ISO 27001

(C). GDPR

(D). PCI-DSS

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

NO.16 Several users have opened tickets with the help desk. The help desk has reassigned the tickets to a security analyst for further review The security analyst reviews the following metrics:

Which of the following is MOST likely the result of the security analyst's review?

(A). The ISP is dropping outbound connections

(B). The user of the Sales-PC fell for a phishing attack

(C). Corporate PCs have been turned into a botnet

(D). An on-path attack is taking place between PCs and the router

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

NO.17 A security analyst wants to fingerprint a web server Which of the following tools will the security analyst MOST likely use to accomplish this task?

(A). nmap -p1-65S35 192.168.0.10

(B). dig 192.168.0.10

(C). curl --head http://192.168.0.10

(D). ping 192.168.0.10

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?