Search Header Logo

Sec+ Practice Test_2

Authored by Eitan A

Computers

Professional Development

Used 1+ times

Sec+ Practice Test_2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

The new Chief Information Security Officer at a company has asked the security team to implement stronger user account policies. The new policies require:

• Users to choose a password unique to their last ten passwords

• Users to not log in from certain high-risk countries

Which of the following should the security team implement? (Select TWO).

Password complexity

Password history

Geolocation

Geofencing

Geotagging

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following explains why RTO is included in a BIA?

It identifies the amount of allowable downtime for an application or system,

It prioritizes risks, so the organization can allocate resources appropriately,

It monetizes the loss of an asset and determines a break-even point for risk mitigation.

It informs the backup approach so that the organization can recover data at a known time.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following uses SAML for authentication?

TOTP

Federation

Kerberos

HOTP

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a policy that provides a greater depth and breadth of knowledge across an organization?

Asset management policy

Separation of duties policy

Acceptable use policy

Job Rotation policy

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user reports falling for a phishing email to an analyst. Which of the following system logs would the analyst check FIRST?

DNS

Message gateway

Network

Authentication

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A cyber-security administrator is using an enterprise firewall. The administrator created some rules, but now seems to be unresponsive. All connections being dropped by the firewall. Which of the following would be the BEST option to remove the rules?

# iptables -t mangle -x

# iptables -f

# iptables -z

# iptables -p input -j drop

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst has been tasked with finding the maximum amount of data loss that can occur before ongoing business operations would be impacted. Which of the following terms BEST defines this metric?

MTTR

RTO

RPO

MTBF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?