101-120
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Easy
Bilal Karaaslan
Used 20+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
You are security administrator investigating a potential infection on a network.
Click on each host and firewall. Review all logs to determine which host originated the Infecton and
then deny each remaining hosts clean or infected.
.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?
RDP server
Jump server
Proxy server
Hypervisor
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)
Impersonation
Phishing
Smishing
Vishing
Typosquatting
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer's PII?
SCAP
Net Flow
Antivirus
DLP
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following involves an attempt to take advantage of database misconfigurations?
Buffer overflow
SQL injection
VM escape
Memory injection
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?
Concurrent session usage
Secure DNS cryptographic downgrade
On-path resource consumption
Reflected denial of service
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following roles, according to the shared responsibility model, is responsible for securing the company's database in an IaaS model for a cloud environment?
Client
Third-party vendor
Cloud provider
DBA
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Excel for Business Q2
Quiz
•
Professional Development
15 questions
Computer basics for beginners
Quiz
•
Professional Development
20 questions
Sains Komputer Tingkatan 5 - 1.3.1 Menerangkan get logik
Quiz
•
1st Grade - Professio...
15 questions
Sec+ CH.2 Review Test
Quiz
•
Professional Development
20 questions
SISTEMAS_REPASO UF2
Quiz
•
Professional Development
15 questions
Unit 1 lesson 1
Quiz
•
University - Professi...
15 questions
JOB PRO - SOFTWARE
Quiz
•
Professional Development
17 questions
Mitos Ou Verdade? Parada Pedagógica TI 2024
Quiz
•
Professional Development
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
