
Security + quiz 19

Quiz
•
Instructional Technology
•
Professional Development
•
Hard

Matt Hansen
Used 1+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios BEST describes a risk reduction technique?
A security control objective cannot be met through a technical change, so the company purchases insurance and is no longer concerned about losses from data breaches.
A security control objective cannot be met through a technical change, so the company implements a policy to train users on a more secure method of operation.
A security control objective cannot be met through a technical change, so the company changes as method of operation
A security control objective cannot be met through a technical change, so the Chief Information Officer (CIO) decides to sign off on the risk.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?
SED
HSM
DLP
TPM
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An end user reports a computer has been acting slower than normal for a few weeks. During an
investigation, an analyst determines the system is sending the user's email address and a tendigit number to an IP address once a day. The only recent log entry regarding the user's
computer is the following:
Time: 06:32:29 UTC
Event Description: This file meets the ML algorithm's medium-confidence threshold.
Process Blocked: False
File Quarantined: False
Operating System: Windows 10
File Name: \Device\HarddiskVolume4\Users\jdoe\AppData\Local\Microsoft\Windows\INetCache\IE\pdftodcx.msi
Connection Details: 35.242.219.204:80
Which of the following is the MOST likely cause of the issue?
The end user purchased and installed a PUP from a web browser
A bot on the computer is brute forcing passwords against a website
A hacker is attempting to exfiltrate sensitive data
Ransomware is communicating with a command-and-control server.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?
An attacker is sniffing traffic to port 53, and the server is managed using unencrypted usernames and passwords.
An organization is experiencing excessive traffic on port 53 and suspects an attacker is trying to DoS the domain name server.
Malware trying to resolve an unregistered domain name to determine if it is running in an isolated sandbox
Routing tables have been compromised, and an attacker is rerouting traffic to malicious websites
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the cause of the access issues?
False rejection
Cross-over error rate
Efficacy rale
Attestation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial option article in a national newspaper, which may result in new cyberattacks Which of the following would be BEST for the security manager to use in a threat mode?
Hacktivists
White-hat hackers
Script kiddies
Insider threats
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?
Tokenization
Data masking
Normalization
Obfuscation
Create a free account and access millions of resources
Similar Resources on Wayground
12 questions
Sec+ Domain 1.1

Quiz
•
Professional Development
15 questions
Importance of Logs

Quiz
•
Professional Development
10 questions
Quiz day 4

Quiz
•
Professional Development
15 questions
PWCS Data Security and Compliance Quiz

Quiz
•
Professional Development
11 questions
Cyber Security Awareness Training Quiz 2024

Quiz
•
Professional Development
10 questions
IT General Control

Quiz
•
Professional Development
10 questions
Google X UR

Quiz
•
Professional Development
9 questions
Cyber Safe Session 2

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade