Security + quiz 13

Security + quiz 13

Professional Development

13 Qs

quiz-placeholder

Similar activities

Scratch E

Scratch E

1st Grade - Professional Development

16 Qs

ATPC INOVA

ATPC INOVA

Professional Development

10 Qs

Teste - Aula - 1

Teste - Aula - 1

Professional Development

12 Qs

AI-900 - Fundamentals - Simulado 01

AI-900 - Fundamentals - Simulado 01

Professional Development

10 Qs

Introdução à Computação

Introdução à Computação

Professional Development

10 Qs

Actividad 2

Actividad 2

Professional Development

10 Qs

All about Google Workspace

All about Google Workspace

Professional Development

15 Qs

Quizizz Introduction

Quizizz Introduction

Professional Development

17 Qs

Security + quiz 13

Security + quiz 13

Assessment

Quiz

Instructional Technology

Professional Development

Practice Problem

Hard

Created by

Matt Hansen

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst needs to be proactive in understand the types of attacks that could potentially target the company's execute. Which of the following intelligence sources should to security analyst review?

Vulnerability feeds

Trusted automated exchange of indicator information

Structured threat information expression

Industry information-sharing and collaboration groups

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybersecurity department purchased o new PAM solution. The team is planning to randomize the service account credentials of the Windows server first. Which of the following would be the BEST method to increase the security on the Linux server?

Randomize the shared credentials

Use only guest accounts to connect.

Use SSH keys and remove generic passwords

Remove all user accounts.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a projected network segment. Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?

DNS sinkholding

DLP rules on the terminal

An IP blacklist

Application whitelisting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization has decided to host its web application and database in the cloud. Which of the following BEST describes the security concerns for this decision?

Access to the organization's servers could be exposed to other cloud-provider clients

The cloud vendor is a new attack vector within the supply chain

Outsourcing the code development adds risk to the cloud provider

Vendor support will cease when the hosting platforms reach EOL.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output:

Which of the following attacks does the analyst MOST likely see in this packet capture?

Session replay

Evil twin

Bluejacking

ARP poisoning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user recently attended an exposition and received some digital promotional materials. The user later noticed blue boxes popping up and disappearing on the computer, and reported receiving several spam emails, which the user did not open. Which of the following is MOST likely the cause of the reported issue?

There was a drive-by download of malware

The user installed a cryptominer

The OS was corrupted

There was malicious code on the USB drive

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A security analyst is performing a packet capture on a series of SOAP HTTP requests for a security assessment. The analyst redirects the output to a file After the capture is complete, the analyst needs to review the first transactions quickly and then search the entire series of requests for a particular string. Which of the following would be BEST to use to accomplish the task?

(Select TWO).

head

Tcpdump

grep

rail

curl

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?