Sec+ Practice Test_1

Sec+ Practice Test_1

Professional Development

15 Qs

quiz-placeholder

Similar activities

Data Visualization

Data Visualization

Professional Development

11 Qs

DOCUMENT-INFORMATION SECURITY

DOCUMENT-INFORMATION SECURITY

Professional Development

20 Qs

Winter 2018 District Finals

Winter 2018 District Finals

Professional Development

10 Qs

PMI-PBA_01:需要评估

PMI-PBA_01:需要评估

Professional Development

11 Qs

Malware Security

Malware Security

Professional Development

15 Qs

PHO Unit 3

PHO Unit 3

Professional Development

10 Qs

M4-Q1

M4-Q1

Professional Development

10 Qs

Operation and Management of WTP

Operation and Management of WTP

Professional Development

15 Qs

Sec+ Practice Test_1

Sec+ Practice Test_1

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Eitan A

Used 5+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO)

The back-end directory source

The identity federation protocol

The hashing method

The encryption method

The registration authority

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A systems administrator is troubleshooting a server's connection to an internal web server. The administrator

needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?

Ipconfig

ssh

Ping

Netstat

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

A security analyst is investigating suspicious traffic on the web server located at IP address 10.10.1.1. A search of the WAF logs reveals the following output:

XSS attack

SQLi attack

Replay attack

XSRF attack

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst wants to fingerprint a web server. Which of the following tools will the security analyst MOST likely use to accomplish this task?

nmap -pl-65S35 192.168.0.10

dig 192.168.0.10

ping 192.168.0.10

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the MOST effective control against zero-day vulnerabilities?

Network segmentation

Patch management

Intrusion prevention system

Multiple vulnerability scanners

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security proposal was set up to track requests for remote access by creating a baseline of the users' common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which of the following should be configured in order to deploy the proposal?

Context-aware authentication

Simultaneous authentication of equals

Extensive authentication protocol

Agentless network access control

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Chief Information Security Officer directed a risk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access. Which of the following is the BEST security solution to reduce this risk?

MFA

VPN concentrator

CASB

VPC endpoint

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?