Search Header Logo

Sec+ Practice Test_3

Authored by Eitan A

Computers

Professional Development

Used 1+ times

Sec+ Practice Test_3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a difference between a DRP and a BCP?

A. A BCP keeps operations running during a disaster, while a DRP does not.

B. A BCP prepares for any operational interruption, while a DRP prepares for natural disasters.

C. BCP is a technical response to disasters while a DRP is operational.

D. A BCP is formally written and approved, while a DRP is not.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?

A. TLS

B. PFS

C. ESP

D. AH

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?

A. Code signing

B. Fuzzing

C. Manual code review

D. Dynamic code analysis

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst is investigating a malware incident at a company. The malware is accessing a command-and-control website at www.comptia.com. All outbound Internet traffic is logged to a syslog server and stored in / logfiles/messages. Which of the following commands would be BEST for the analyst to use on the syslog server to search for recent traffic to the command-and-control website?

A. head -500 www.comptia.com | grep /logfiles/messages

B. cat /logfiles/messages | tail -500 www.comptia.com

C. tail -500 /logfiles/messages | grep www.comptia.com

D. grep -500 /logfiles/messages | cat www.comptia.com

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?

A. Data encryption

B. Data masking

C. Data deduplication

D. Data minimization

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company has limited storage space available and an online presence that cannot be down for more than four hours. Which of the following backup methodologies should the company implement to allow for the FASTEST database restore time in the event of a failure, while being mindful of the limited available storage space?

A. Implement full tape backup every Sunday at 8:00 p.m and perform nightly tape rotations.

B. Implement different backups every Sunday at 8:00 and nightly incremental backups at 8:00 p.m

C. Implement nightly full backups every Sunday at 8:00 p.m

D. Implement full backups every Sunday at 8:00 p.m and nightly differential backups at 8:00 pm

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

A security analyst is reviewing the following attack log output: Which of the following types of attacks does this MOST likely represent?

A. Rainbow table

B. Brute-force

C. Password-spraying

D. Dictionary

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?