Sec+ Practice Test_1

Sec+ Practice Test_1

Professional Development

15 Qs

quiz-placeholder

Similar activities

Marketing and Advertising

Marketing and Advertising

Professional Development

15 Qs

Plans & Maxis Device Contract

Plans & Maxis Device Contract

Professional Development

16 Qs

V20 Performance

V20 Performance

Professional Development

16 Qs

Quiz 1

Quiz 1

Professional Development

10 Qs

SBILD Kochi T20

SBILD Kochi T20

Professional Development

20 Qs

SI Units

SI Units

Professional Development

10 Qs

Perform Online Collaboration A

Perform Online Collaboration A

Professional Development

12 Qs

8D=PACE-Induction-Session-2

8D=PACE-Induction-Session-2

Professional Development

12 Qs

Sec+ Practice Test_1

Sec+ Practice Test_1

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Hard

Created by

Eitan A

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO)

The back-end directory source

The identity federation protocol

The hashing method

The encryption method

The registration authority

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A systems administrator is troubleshooting a server's connection to an internal web server. The administrator

needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?

Ipconfig

ssh

Ping

Netstat

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

A security analyst is investigating suspicious traffic on the web server located at IP address 10.10.1.1. A search of the WAF logs reveals the following output:

XSS attack

SQLi attack

Replay attack

XSRF attack

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst wants to fingerprint a web server. Which of the following tools will the security analyst MOST likely use to accomplish this task?

nmap -pl-65S35 192.168.0.10

dig 192.168.0.10

ping 192.168.0.10

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the MOST effective control against zero-day vulnerabilities?

Network segmentation

Patch management

Intrusion prevention system

Multiple vulnerability scanners

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security proposal was set up to track requests for remote access by creating a baseline of the users' common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which of the following should be configured in order to deploy the proposal?

Context-aware authentication

Simultaneous authentication of equals

Extensive authentication protocol

Agentless network access control

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Chief Information Security Officer directed a risk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access. Which of the following is the BEST security solution to reduce this risk?

MFA

VPN concentrator

CASB

VPC endpoint

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?