
Sec+ Domain 2 - All in One
Authored by Isabella S
Computers
Professional Development
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
56 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An organization wants to quickly assess how effectively the IT team hardened new laptops. Which of the following would be the best solution to perform this assessment?
Install a SIEM tool and properly configure it to read the OS configuration files.
Load current baselines into the existing vulnerability scanner.
Maintain a risk register with each security control marked as compliant or non-compliant.
Manually review the secure configuration guide checklists.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following would BEST provide detective and corrective controls for thermal regulation?
A smoke detector
A fire alarm
An HVAC system
A fire suppression system
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a security best practice that ensures the integrity of aggregated log files within a SIEM?
Set up hashing on the source log file servers that comply with local regulatory requirements.
Back up the aggregated log files at least two times a day or as stated by local regulatory requirements.
Write protect the aggregated log files and move them to an isolated server with limited access.
Back up the source log files and archive them for at least six years or in accordance with local regulatory requirements.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?
Pulverizing
Shredding
Incinerating
Degaussing
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security engineer needs to create a network segment that can be used for servers that require connections from untrusted networks. Which of the following should the engineer implement?
An air gap
A hot site
A VLAN
A screened subnet
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following biometric authentication methods is the MOST accurate?
Gait
Retina
Signature
Voice
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Some laptops recently went missing from a locked storage area that is protected by keyless RFID-enabled locks. There is no obvious damage to the physical space. The security manager identifies who unlocked the door, however, human resources confirm the employee was on vacation at the time of the incident. Which of the following describes what MOST likely occurred?
The employee's physical access card was cloned.
The employee is colluding with human resources
The employee's biometrics were harvested
A criminal used lock picking tools to open the door.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?