NO.151 Which of the following technologies can be used to house the entropy keys for disk
encryption on desktops and laptops?
CySA+ (151-200)
Quiz
•
Computers
•
KG
•
Easy
cysa cysa
Used 40+ times
FREE Resource
49 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.151 Which of the following technologies can be used to house the entropy keys for disk
encryption on desktops and laptops?
Self-encrypting drive
Bus encryption
TPM
HSM
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.153 An employee in the billing department accidentally sent a spreadsheet containing payment
card data to a recipient outside the organization The employee intended to send the spreadsheet to
an internal staff member with a similar name and was unaware of the mistake until the recipient
replied to the message In addition to retraining the employee, which of the following would prevent
this from happening in the future?
(ExamTopic'e gore guncellendi)
A. Implement outgoing filter rules to quarantine messages that contain card data
B. Configure the outgoing mail filter to allow attachments only to addresses on the whitelist
C. Remove all external recipients from the employee's address book
D. Set the outgoing mail filter to strip spreadsheet attachments from all messages.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.152 A cybersecurity analyst is responding to an incident. The company's leadership team wants
to attribute the incident to an attack group. Which of the following models would BEST apply to the
situation?
Intelligence cycle
Diamond Model of Intrusion Analysis
Kill chain
MITRE ATT&CK
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.154 During an investigation, a security analyst determines suspicious activity occurred during
the night shift over the weekend. Further investigation reveals the activity was initiated from an
internal IP going to an external website.
Which of the following would be the MOST appropriate recommendation to prevent the activity from
happening in the future?
An IPS signature modification for the specific IP addresses
An IDS signature modification for the specific IP addresses
A firewall rule that will block port 80 traffic
A firewall rule that will block traffic from the specific IP addresses
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.155 Company A is m the process of merging with Company B As part of the merger, connectivity between the ERP systems must be established so portent financial information can be shared between the two entitles. Which of the following will establish a more automated approach to secure data transfers between the two entities?
A. Set up an FTP server that both companies can access and export the required financial data to a
folder.
B. Set up a VPN between Company A and Company B. granting access only lo the ERPs within the
connection
C. Set up a PKI between Company A and Company B and Intermediate shared certificates between
the two entities
D. Create static NATs on each entity's firewalls that map lo the ERP systems and use native ERP
authentication to allow access.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
xxx
xxx
xxx
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.157 A code review reveals a web application is using lime-based cookies for session
management. This is a security concern because lime-based cookies are easy to:
parameterize.
decode.
guess.
decrypt.
50 questions
Software engineering MCQ Test 1
Quiz
•
University
54 questions
Grade 6 ICT Review - Noah
Quiz
•
8th Grade - University
44 questions
CMO: Chapter 3
Quiz
•
KG
46 questions
CompTIA ITFundamentals CRAM
Quiz
•
6th Grade - University
45 questions
A+ 1102 Study Quiz 3
Quiz
•
Professional Development
50 questions
IAS2-NW3A
Quiz
•
University
50 questions
Term 03 - Grade 8 Revision
Quiz
•
8th Grade
49 questions
CySA + (301-350)
Quiz
•
KG
25 questions
Equations of Circles
Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)
Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System
Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice
Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers
Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons
Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)
Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review
Quiz
•
10th Grade