Which of the following scenarios BEST describes a risk reduction technique?

Security + quiz 19

Quiz
•
Instructional Technology
•
Professional Development
•
Hard

Matt Hansen
Used 1+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security control objective cannot be met through a technical change, so the company purchases insurance and is no longer concerned about losses from data breaches.
A security control objective cannot be met through a technical change, so the company implements a policy to train users on a more secure method of operation.
A security control objective cannot be met through a technical change, so the company changes as method of operation
A security control objective cannot be met through a technical change, so the Chief Information Officer (CIO) decides to sign off on the risk.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?
SED
HSM
DLP
TPM
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An end user reports a computer has been acting slower than normal for a few weeks. During an
investigation, an analyst determines the system is sending the user's email address and a tendigit number to an IP address once a day. The only recent log entry regarding the user's
computer is the following:
Time: 06:32:29 UTC
Event Description: This file meets the ML algorithm's medium-confidence threshold.
Process Blocked: False
File Quarantined: False
Operating System: Windows 10
File Name: \Device\HarddiskVolume4\Users\jdoe\AppData\Local\Microsoft\Windows\INetCache\IE\pdftodcx.msi
Connection Details: 35.242.219.204:80
Which of the following is the MOST likely cause of the issue?
The end user purchased and installed a PUP from a web browser
A bot on the computer is brute forcing passwords against a website
A hacker is attempting to exfiltrate sensitive data
Ransomware is communicating with a command-and-control server.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?
An attacker is sniffing traffic to port 53, and the server is managed using unencrypted usernames and passwords.
An organization is experiencing excessive traffic on port 53 and suspects an attacker is trying to DoS the domain name server.
Malware trying to resolve an unregistered domain name to determine if it is running in an isolated sandbox
Routing tables have been compromised, and an attacker is rerouting traffic to malicious websites
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the cause of the access issues?
False rejection
Cross-over error rate
Efficacy rale
Attestation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial option article in a national newspaper, which may result in new cyberattacks Which of the following would be BEST for the security manager to use in a threat mode?
Hacktivists
White-hat hackers
Script kiddies
Insider threats
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?
Tokenization
Data masking
Normalization
Obfuscation
Create a free account and access millions of resources
Similar Resources on Quizizz
11 questions
Cyber Security Awareness Training Quiz 2024

Quiz
•
Professional Development
10 questions
Google IT Support Certification Quiz

Quiz
•
KG - Professional Dev...
15 questions
C# TOPIC NEW-2

Quiz
•
Professional Development
11 questions
Be Tech & Business Program - Trivia

Quiz
•
Professional Development
15 questions
SNAF Quiz 3

Quiz
•
Professional Development
15 questions
Vehicle Telematics

Quiz
•
12th Grade - Professi...
15 questions
PWCS Data Security and Compliance Quiz

Quiz
•
Professional Development
10 questions
Network & Perimeter Security

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade