Search Header Logo

SEC+ set 1

Authored by Dove Soap

Instructional Technology

Professional Development

Used 1+ times

SEC+ set 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective?

A reverse proxy

A decryption certificate

A spill-tunnel VPN

Load-balanced servers

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During

which of the following phases of the response process is this activity MOST likely occurring?

Containment

Preparation

Recovery

Identification

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security engineer needs to create a network segment that can be used for servers that require connections from

untrusted networks. Which of the following should the engineer implement?

An air gap

A screened subnet

A VLAN

A hot site

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A systems engineer is building a new system for production. Which of the following is the FINAL step to be performed prior to promotion to production?

Disable unneeded services.

Install the latest security patches.

Run a vulnerability scan.

Encrypt all disks.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A major clothing company recently lost a large amount of proprietary information. The security officer must find a solution to ensure this never happens again. Which of the following is the BEST technical implementation to prevent this from happening again?

Configure DLP solutions

Disable peer-to-peer sharing

Enable role-based

Mandate job rotation

Implement content filters

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would be BEST for a technician to review to determine the total risk an organization can bear

when assessing a "cloud-first" adoption strategy?

Risk matrix

Risk tolerance

Risk register

Risk appetite

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Ann, a customer, received a notification from her mortgage company stating her PII may be shared with partners,

affiliates, and associates to maintain day-to-day business operations.

Which of the following documents did Ann receive?

An annual privacy notice

A non-disclosure agreement

A privileged-user agreement

A memorandum of understanding

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?