Security + quiz 19

Security + quiz 19

Professional Development

14 Qs

quiz-placeholder

Similar activities

IT General Control

IT General Control

Professional Development

10 Qs

PWCS Data Security and Compliance Quiz

PWCS Data Security and Compliance Quiz

Professional Development

15 Qs

Website Security Features.

Website Security Features.

Professional Development

11 Qs

Cyber Security Awareness Training Quiz 2024

Cyber Security Awareness Training Quiz 2024

Professional Development

11 Qs

Cloud migration prerequisite

Cloud migration prerequisite

University - Professional Development

15 Qs

ICA TRIAD

ICA TRIAD

Professional Development

10 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Cybersecurity, Victor Magnusson

Cybersecurity, Victor Magnusson

1st Grade - Professional Development

10 Qs

Security + quiz 19

Security + quiz 19

Assessment

Quiz

Instructional Technology

Professional Development

Hard

Created by

Matt Hansen

Used 1+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios BEST describes a risk reduction technique?

A security control objective cannot be met through a technical change, so the company purchases insurance and is no longer concerned about losses from data breaches.

A security control objective cannot be met through a technical change, so the company implements a policy to train users on a more secure method of operation.

A security control objective cannot be met through a technical change, so the company changes as method of operation

A security control objective cannot be met through a technical change, so the Chief Information Officer (CIO) decides to sign off on the risk.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?

SED

HSM

DLP

TPM

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An end user reports a computer has been acting slower than normal for a few weeks. During an

investigation, an analyst determines the system is sending the user's email address and a tendigit number to an IP address once a day. The only recent log entry regarding the user's

computer is the following:

Time: 06:32:29 UTC

Event Description: This file meets the ML algorithm's medium-confidence threshold.

Process Blocked: False

File Quarantined: False

Operating System: Windows 10

File Name: \Device\HarddiskVolume4\Users\jdoe\AppData\Local\Microsoft\Windows\INetCache\IE\pdftodcx.msi

Connection Details: 35.242.219.204:80

Which of the following is the MOST likely cause of the issue?

The end user purchased and installed a PUP from a web browser

A bot on the computer is brute forcing passwords against a website

A hacker is attempting to exfiltrate sensitive data

Ransomware is communicating with a command-and-control server.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?

An attacker is sniffing traffic to port 53, and the server is managed using unencrypted usernames and passwords.

An organization is experiencing excessive traffic on port 53 and suspects an attacker is trying to DoS the domain name server.

Malware trying to resolve an unregistered domain name to determine if it is running in an isolated sandbox

Routing tables have been compromised, and an attacker is rerouting traffic to malicious websites

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the cause of the access issues?

False rejection

Cross-over error rate

Efficacy rale

Attestation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial option article in a national newspaper, which may result in new cyberattacks Which of the following would be BEST for the security manager to use in a threat mode?

Hacktivists

White-hat hackers

Script kiddies

Insider threats

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?

Tokenization

Data masking

Normalization

Obfuscation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?