Sec+ Practice Test_3

Sec+ Practice Test_3

Professional Development

15 Qs

quiz-placeholder

Similar activities

SEC+ Ch.9 Review Test

SEC+ Ch.9 Review Test

Professional Development

15 Qs

Sec Practice Quiz

Sec Practice Quiz

Professional Development

15 Qs

Linkedin CyberSec Test

Linkedin CyberSec Test

Professional Development

20 Qs

BSIT 2B Q#3

BSIT 2B Q#3

Professional Development

10 Qs

6. Day 3_ITBA 10 Soal

6. Day 3_ITBA 10 Soal

KG - Professional Development

10 Qs

Sec+ Quiz - 1

Sec+ Quiz - 1

Professional Development

15 Qs

CCIE overview

CCIE overview

Professional Development

15 Qs

Cyber Quiz

Cyber Quiz

Professional Development

17 Qs

Sec+ Practice Test_3

Sec+ Practice Test_3

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Eitan A

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a difference between a DRP and a BCP?

A. A BCP keeps operations running during a disaster, while a DRP does not.

B. A BCP prepares for any operational interruption, while a DRP prepares for natural disasters.

C. BCP is a technical response to disasters while a DRP is operational.

D. A BCP is formally written and approved, while a DRP is not.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?

A. TLS

B. PFS

C. ESP

D. AH

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?

A. Code signing

B. Fuzzing

C. Manual code review

D. Dynamic code analysis

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst is investigating a malware incident at a company. The malware is accessing a command-and-control website at www.comptia.com. All outbound Internet traffic is logged to a syslog server and stored in / logfiles/messages. Which of the following commands would be BEST for the analyst to use on the syslog server to search for recent traffic to the command-and-control website?

A. head -500 www.comptia.com | grep /logfiles/messages

B. cat /logfiles/messages | tail -500 www.comptia.com

C. tail -500 /logfiles/messages | grep www.comptia.com

D. grep -500 /logfiles/messages | cat www.comptia.com

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?

A. Data encryption

B. Data masking

C. Data deduplication

D. Data minimization

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company has limited storage space available and an online presence that cannot be down for more than four hours. Which of the following backup methodologies should the company implement to allow for the FASTEST database restore time in the event of a failure, while being mindful of the limited available storage space?

A. Implement full tape backup every Sunday at 8:00 p.m and perform nightly tape rotations.

B. Implement different backups every Sunday at 8:00 and nightly incremental backups at 8:00 p.m

C. Implement nightly full backups every Sunday at 8:00 p.m

D. Implement full backups every Sunday at 8:00 p.m and nightly differential backups at 8:00 pm

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

A security analyst is reviewing the following attack log output: Which of the following types of attacks does this MOST likely represent?

A. Rainbow table

B. Brute-force

C. Password-spraying

D. Dictionary

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?