
Sorular 11-20
Authored by Bny *
Computers
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.11 Which of the following control types is focused primarily on reducing risk before an incident occurs?
(A). Preventive
(B). Deterrent
(C). Corrective
(D). Detective
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.12 An organization has developed an application that needs a patch to fix a critical vulnerability In which of the following environments should the patch be deployed LAST?
(A). Test
(B). Staging
(C). Development
(D). Production
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.13 Which of the following control Types would be BEST to use in an accounting department to reduce losses from fraudulent transactions?
(A). Recovery
(B). Deterrent
(C). Corrective
(D). Detective
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.14 Which of the following risk management strategies would an organization use to maintain a legacy system with known risks for operational purposes?
(A). Acceptance
(B). Transference
(C). Avoidance
(D). Mitigation
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.15 A social media company based in North America is looking to expand into new global markets and needs to maintain compliance with international standards With which of the following is the company's data protection officer MOST likely concerned''
(A). NIST Framework
(B). ISO 27001
(C). GDPR
(D). PCI-DSS
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.16 Several users have opened tickets with the help desk. The help desk has reassigned the tickets to a security analyst for further review The security analyst reviews the following metrics:
Which of the following is MOST likely the result of the security analyst's review?
(A). The ISP is dropping outbound connections
(B). The user of the Sales-PC fell for a phishing attack
(C). Corporate PCs have been turned into a botnet
(D). An on-path attack is taking place between PCs and the router
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.17 A security analyst wants to fingerprint a web server Which of the following tools will the security analyst MOST likely use to accomplish this task?
(A). nmap -p1-65S35 192.168.0.10
(B). dig 192.168.0.10
(C). curl --head http://192.168.0.10
(D). ping 192.168.0.10
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?