
CompTIA Sec+
Quiz
•
Computers
•
Professional Development
•
Medium
Joseph Lafortune
Used 7+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of the following access control schemes would be BEST for the company to implement?
Discretionary
Rule-based
Role-based
Mandatory
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?
Install a NIDS device at the boundary.
Segment the network with firewalls.
Update all antivirus signatures daily.
Implement application blacklisting.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office. Priority must be given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?
Nmap
Heat Map
Network DIagrams
Wireshark
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?
Incident Response
COmmunications
Disaster Recovery
Data Retention
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy?
Mobile device management
Full-device encryption
Remote wipe
Biometrics
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?
Predictability
Key STretching
Salting
Hashing
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider. Which of the following risk management strategies is this an example of?
Acceptance
Mitigation
Avoidance
Transference
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Evaluación de la unida i, II,III
Quiz
•
Professional Development
20 questions
machineLearning Test
Quiz
•
Professional Development
18 questions
Google Classroom
Quiz
•
Professional Development
17 questions
STIN (EM24) - Tecnologías 4.0 (T13)
Quiz
•
University - Professi...
20 questions
Navisoft Year End Party Game
Quiz
•
Professional Development
19 questions
Pokemon
Quiz
•
1st Grade - Professio...
20 questions
SPARK FIDDLE
Quiz
•
Professional Development
20 questions
TEMA 8 MONT (MANTENIMIENTO) - PROFESOR
Quiz
•
KG - Professional Dev...
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade
