Security + quiz 13

Security + quiz 13

Professional Development

13 Qs

quiz-placeholder

Similar activities

IT Operations

IT Operations

Professional Development

10 Qs

OER Lesson 2

OER Lesson 2

Professional Development

10 Qs

Transmission Quiz

Transmission Quiz

9th Grade - Professional Development

10 Qs

Sec+ Domain 1.1

Sec+ Domain 1.1

Professional Development

12 Qs

Quiz day 4

Quiz day 4

Professional Development

10 Qs

Jira structure

Jira structure

Professional Development

11 Qs

Google Calendar, Sites, and Keep

Google Calendar, Sites, and Keep

Professional Development

11 Qs

SNAF Quiz 1

SNAF Quiz 1

Professional Development

15 Qs

Security + quiz 13

Security + quiz 13

Assessment

Quiz

Instructional Technology

Professional Development

Hard

Created by

Matt Hansen

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst needs to be proactive in understand the types of attacks that could potentially target the company's execute. Which of the following intelligence sources should to security analyst review?

Vulnerability feeds

Trusted automated exchange of indicator information

Structured threat information expression

Industry information-sharing and collaboration groups

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybersecurity department purchased o new PAM solution. The team is planning to randomize the service account credentials of the Windows server first. Which of the following would be the BEST method to increase the security on the Linux server?

Randomize the shared credentials

Use only guest accounts to connect.

Use SSH keys and remove generic passwords

Remove all user accounts.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a projected network segment. Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?

DNS sinkholding

DLP rules on the terminal

An IP blacklist

Application whitelisting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization has decided to host its web application and database in the cloud. Which of the following BEST describes the security concerns for this decision?

Access to the organization's servers could be exposed to other cloud-provider clients

The cloud vendor is a new attack vector within the supply chain

Outsourcing the code development adds risk to the cloud provider

Vendor support will cease when the hosting platforms reach EOL.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output:

Which of the following attacks does the analyst MOST likely see in this packet capture?

Session replay

Evil twin

Bluejacking

ARP poisoning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user recently attended an exposition and received some digital promotional materials. The user later noticed blue boxes popping up and disappearing on the computer, and reported receiving several spam emails, which the user did not open. Which of the following is MOST likely the cause of the reported issue?

There was a drive-by download of malware

The user installed a cryptominer

The OS was corrupted

There was malicious code on the USB drive

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A security analyst is performing a packet capture on a series of SOAP HTTP requests for a security assessment. The analyst redirects the output to a file After the capture is complete, the analyst needs to review the first transactions quickly and then search the entire series of requests for a particular string. Which of the following would be BEST to use to accomplish the task?

(Select TWO).

head

Tcpdump

grep

rail

curl

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?