CompTIA Sec+

CompTIA Sec+

Professional Development

20 Qs

quiz-placeholder

Similar activities

1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni

1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni

University - Professional Development

20 Qs

Digital Electronics (Weekend Assignment - 3)

Digital Electronics (Weekend Assignment - 3)

University - Professional Development

20 Qs

Technical Training

Technical Training

Professional Development

15 Qs

20764 - SQL - Mod 5 and 6

20764 - SQL - Mod 5 and 6

Professional Development

18 Qs

Google Nivel 1 7-9

Google Nivel 1 7-9

Professional Development

15 Qs

business 1.4 revision

business 1.4 revision

KG - Professional Development

20 Qs

Réseaux 1

Réseaux 1

Professional Development

20 Qs

HC Análisis y reconocimiento de la interfaz (V2)

HC Análisis y reconocimiento de la interfaz (V2)

Professional Development

18 Qs

CompTIA Sec+

CompTIA Sec+

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Joseph Lafortune

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of the following access control schemes would be BEST for the company to implement?

Discretionary

Rule-based

Role-based

Mandatory

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?

Install a NIDS device at the boundary.

Segment the network with firewalls.

Update all antivirus signatures daily.

Implement application blacklisting.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office. Priority must be given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?

Nmap

Heat Map

Network DIagrams

Wireshark

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?

Incident Response

COmmunications

Disaster Recovery

Data Retention

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy?

Mobile device management

Full-device encryption

Remote wipe

Biometrics

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?

Predictability

Key STretching

Salting

Hashing

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider. Which of the following risk management strategies is this an example of?

Acceptance

Mitigation

Avoidance

Transference

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?