
15 question Security+ Quiz March 2023
Authored by Prem Jadhwani
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Your organization hosts an e-commerce web server. The server randomly
experiences a high volume of sales and usage from mid-November to the
end of December, causing spikes in resource usage. These spikes have
resulted in outages during the past year. Which of the following should be
implemented to prevent these outages?
Stored Procedures
Scalability
Version Control
Memory Management
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Employees currently log in with their username and a password but
management wants to increase login security by implementing smart cards.
However, the IT department anticipates it will take a long time to purchase
the necessary equipment and issue smart cards for everyone. You need to
identify a solution that will provide comparable security until the smart
cards are implemented. Which of the following is a compensating control
that will meet these needs?
Implement an account lockout policy
Increase password policy requirements.
Implement a TOTP solution.
Require users to change their password more often.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have configured a firewall in your network to block ICMP traffic.
You want to verify that it is working as expected. Which of the following
commands would you use?
ARP
IPCONFIG
ROUTE
PING
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You need to reboot a database server. Before doing so, you need to verify
it doesn’t have any active network connections. Which of the following
commands will BEST meet your needs?
arp
ipconfig
hping3
netstat
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You are troubleshooting an issue with the collaboration application hosted on a
Linux system. You suspect that the issue is caused when performing a
specific function. You execute the function and see a generic error message.
You now want to view the detailed error logged in the messages file. Which
of the following commands would be the BEST choice to use?
head
tail
chmod
logger
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following would be the BEST option to remove all the rules from the firewall?
# iptables -F
# iptables -P INPUT -j DROP
# iptables -Z
# iptables -t mangle -X
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Clarca Corp. based out of Fairfax, VA is in the process of implementing automation with IoT devices and sensors all over their facility for better surveillance at the edge. Which of the following should the organization consider first to keep the network secure from breaches?
Z-Wave compatibility
Network site survey
Zigbee configuration
Communication protocols
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?