Search Header Logo

Sec+ Domain 2 - All in One

Authored by Isabella S

Computers

Professional Development

Used 11+ times

Sec+ Domain 2 - All in One
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

56 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization wants to quickly assess how effectively the IT team hardened new laptops. Which of the following would be the best solution to perform this assessment?

Install a SIEM tool and properly configure it to read the OS configuration files.

Load current baselines into the existing vulnerability scanner.

Maintain a risk register with each security control marked as compliant or non-compliant.

Manually review the secure configuration guide checklists.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would BEST provide detective and corrective controls for thermal regulation?

A smoke detector

A fire alarm

An HVAC system

A fire suppression system

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a security best practice that ensures the integrity of aggregated log files within a SIEM?

Set up hashing on the source log file servers that comply with local regulatory requirements.

Back up the aggregated log files at least two times a day or as stated by local regulatory requirements.

Write protect the aggregated log files and move them to an isolated server with limited access.

Back up the source log files and archive them for at least six years or in accordance with local regulatory requirements.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?

Pulverizing

Shredding

Incinerating

Degaussing

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security engineer needs to create a network segment that can be used for servers that require connections from untrusted networks. Which of the following should the engineer implement?

An air gap

A hot site

A VLAN

A screened subnet

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following biometric authentication methods is the MOST accurate?

Gait

Retina

Signature

Voice

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Some laptops recently went missing from a locked storage area that is protected by keyless RFID-enabled locks. There is no obvious damage to the physical space. The security manager identifies who unlocked the door, however, human resources confirm the employee was on vacation at the time of the incident. Which of the following describes what MOST likely occurred?

The employee's physical access card was cloned.

The employee is colluding with human resources

The employee's biometrics were harvested

A criminal used lock picking tools to open the door.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?