Security + quiz 15

Security + quiz 15

Assessment

Quiz

Instructional Technology

Professional Development

Hard

Created by

Matt Hansen

FREE Resource

Student preview

quiz-placeholder

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization has a growing workforce that is mostly driven by additions to the sales department. Each newly hired salesperson relies on a mobile device to conduct business. The Chief Information Officer (CIO) is wondering it the organization may need to scale down just as quickly as it scaled up. The ClO is also concerned about the organization's security and customer privacy. Which of the following would be BEST to address the ClO's concerns?

Disallow new hires from using mobile devices for six months

Select four devices for the sales department to use in a CYOD model

Implement BYOD for the sates department while leveraging the MDM

Deploy mobile devices using the COPE methodology

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A public relations team will be taking a group of guest on a tour through the facility of a large ecommerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboars are cleaned and all desks are cleared. The company is MOST likely trying to protect against.

Loss of proprietary information

Damage to the company's reputation

Social engineering

Credential exposure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office Priority must be given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?

Nmapn

Heat maps

Network diagrams

Wireshark

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is preparing a threat for an upcoming internal penetration test. The analyst needs to identify a method for determining the tactics, techniques, and procedures of a threat against the organization's network. Which of the following will the analyst MOST likely use to accomplish the objective?

A table exercise

NST CSF

MTRE ATT$CK

OWASP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst has received an alert about being sent via email. The analyst's Chief information Security Officer (CISO) has made it clear that PII must be handle with extreme care From which of the following did the alert MOST likely originate?

S/MIME

DLP

IMAP

HIDS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer (CFO). Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain?

Open the document on an air-gapped network

View the document's metadata for origin clues

Search for matching file hashes on malware websites

Detonate the document in an analysis sandbox

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network engineer notices the VPN concentrator overloaded and crashes on days when there are a lot of remote workers. Senior management has placed greater importance on the availability of VPN resources for the remote workers than the security of the end users' traffic. Which of the following would be BEST to solve this issue?

iPSec

Always On

Split tunneling

L2TP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?