101-120

Quiz
•
Computers
•
Professional Development
•
Easy
Bilal Karaaslan
Used 20+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
You are security administrator investigating a potential infection on a network.
Click on each host and firewall. Review all logs to determine which host originated the Infecton and
then deny each remaining hosts clean or infected.
.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?
RDP server
Jump server
Proxy server
Hypervisor
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)
Impersonation
Phishing
Smishing
Vishing
Typosquatting
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer's PII?
SCAP
Net Flow
Antivirus
DLP
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following involves an attempt to take advantage of database misconfigurations?
Buffer overflow
SQL injection
VM escape
Memory injection
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?
Concurrent session usage
Secure DNS cryptographic downgrade
On-path resource consumption
Reflected denial of service
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following roles, according to the shared responsibility model, is responsible for securing the company's database in an IaaS model for a cloud environment?
Client
Third-party vendor
Cloud provider
DBA
Create a free account and access millions of resources
Similar Resources on Wayground
17 questions
Salesforce Admin WI22

Quiz
•
Professional Development
20 questions
ITF+ Ch7, Database Fundamentals

Quiz
•
Professional Development
15 questions
Sec Practice Quiz

Quiz
•
Professional Development
19 questions
AWS ACF Módulo 4 - Segurança na nuvem

Quiz
•
Professional Development
15 questions
Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Quiz
•
Professional Development
15 questions
Network Plus Pre Assessment

Quiz
•
Professional Development
15 questions
Sec+ CH.2 Review Test

Quiz
•
Professional Development
15 questions
SEC+ Ch.6 Review Test

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade