Sec+ Practice Test_1

Sec+ Practice Test_1

Professional Development

15 Qs

quiz-placeholder

Similar activities

Vocabulary: Housekeeping

Vocabulary: Housekeeping

University - Professional Development

20 Qs

Activism : Be Seen Be Heard

Activism : Be Seen Be Heard

Professional Development

10 Qs

Working in Teams - Recap

Working in Teams - Recap

Professional Development

12 Qs

5S Concepts Quiz

5S Concepts Quiz

Professional Development

15 Qs

Accepting Change Quiz

Accepting Change Quiz

Professional Development

15 Qs

BERLATIH SOAL PPPK Part 2

BERLATIH SOAL PPPK Part 2

Professional Development

15 Qs

Root Cause Analysis

Root Cause Analysis

Professional Development

15 Qs

CIE Invigilation Training

CIE Invigilation Training

Professional Development

10 Qs

Sec+ Practice Test_1

Sec+ Practice Test_1

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Hard

Created by

Eitan A

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO)

The back-end directory source

The identity federation protocol

The hashing method

The encryption method

The registration authority

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A systems administrator is troubleshooting a server's connection to an internal web server. The administrator

needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?

Ipconfig

ssh

Ping

Netstat

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

A security analyst is investigating suspicious traffic on the web server located at IP address 10.10.1.1. A search of the WAF logs reveals the following output:

XSS attack

SQLi attack

Replay attack

XSRF attack

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst wants to fingerprint a web server. Which of the following tools will the security analyst MOST likely use to accomplish this task?

nmap -pl-65S35 192.168.0.10

dig 192.168.0.10

ping 192.168.0.10

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the MOST effective control against zero-day vulnerabilities?

Network segmentation

Patch management

Intrusion prevention system

Multiple vulnerability scanners

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security proposal was set up to track requests for remote access by creating a baseline of the users' common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which of the following should be configured in order to deploy the proposal?

Context-aware authentication

Simultaneous authentication of equals

Extensive authentication protocol

Agentless network access control

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Chief Information Security Officer directed a risk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access. Which of the following is the BEST security solution to reduce this risk?

MFA

VPN concentrator

CASB

VPC endpoint

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development