cwicz4

cwicz4

4th Grade

37 Qs

quiz-placeholder

Similar activities

Animal Crossing

Animal Crossing

4th Grade

42 Qs

amogsus

amogsus

KG - Professional Development

40 Qs

HELE 4 - 4THQ EXAM

HELE 4 - 4THQ EXAM

4th Grade

35 Qs

How far you know Kitchen Equipment and Utensils

How far you know Kitchen Equipment and Utensils

1st - 12th Grade

40 Qs

Progress test 3 reading vocab quiz

Progress test 3 reading vocab quiz

1st - 5th Grade

32 Qs

RBT T1 BAB 5 Aplikasi Teknologi [BAH A]

RBT T1 BAB 5 Aplikasi Teknologi [BAH A]

1st Grade - Professional Development

39 Qs

big city greens

big city greens

KG - 6th Grade

32 Qs

Christmas

Christmas

1st - 4th Grade

32 Qs

cwicz4

cwicz4

Assessment

Quiz

Design

4th Grade

Practice Problem

Medium

Created by

malgorzata malgorzata

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A web server has been compromised due to a ransomware attack. Further Investigation reveals the ransomware has been in the server for the past 72 hours. The systems administrator needs to get the services back up as soon as possible. Which of the following should the administrator use to restore services to a secure state?

The last incremental backup that was conducted 72 hours ago

The last known-good configuration stored by the operating system

The last full backup that was conducted seven days ago

The baseline OS configuration

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company recently experienced a significant data loss when proprietary information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage. Which of the following is the best mitigation strategy to prevent this from happening in the future?

User training

CAsB

MDM

EDR

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following

logs should be analyzed to identify the impacted host? (Select two).

Application

Authentication

Network

Firewall

System

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is most likely to contain ranked and ordered information on the likelihood and potential impact

of catastrophic events that may affect business processes and systems, while also highlighting the residual risks that need to be managed after mitigating controls have been implemented?

An RTO report

A risk register

A business impact analysis

An asset value register

A disaster recovery plan

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During an assessment, a systems administrator found several hosts running FTP and decided to immediately block FTP

communications at the firewall. Which of the following describes the greatest risk associated with using FTP?

Private data can be leaked

FTP is prohibited by internal policy.

Users can upload personal files

Credentials are sent in cleartext.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security professional wants to enhance the protection of a critical environment that is used to store and manage a company's encryption keys. The selected technology should be tamper resistant. Which of the following should the security professional implement to achieve the goal?

DLP

HSM

CA

FIM

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company's help desk has received calls about the wireless network being down and users being unable to connect to it. The network administrator says all access points are up and running One of the help desk technicians notices the affected users are working in a building near the parking lot. Which of the following is the most likely reason for the outage?

Someone near the building is jamming the signal

A user has set up a rogue access point near the building

Someone set up an evil twin access point in the affected area.

The APs in the affected area have been unplugged from the network

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?