Comptia Sec plus part 3

Comptia Sec plus part 3

12th Grade

78 Qs

quiz-placeholder

Similar activities

Office Administration

Office Administration

12th Grade

79 Qs

Spanish Preliminary Lessons

Spanish Preliminary Lessons

9th - 12th Grade

80 Qs

ServSafe Diagnostic Mid-Term

ServSafe Diagnostic Mid-Term

9th - 12th Grade

75 Qs

EXAMEN FINAL DE COMUNICACIÓN Y LITERATURA SEXTO GRADO B 2025

EXAMEN FINAL DE COMUNICACIÓN Y LITERATURA SEXTO GRADO B 2025

6th Grade - University

76 Qs

RM Y CIENCIAS 5

RM Y CIENCIAS 5

12th Grade

80 Qs

SENIOR SEC 2022 AGO IWOYE DAY CELEBRATION QUIZ COMPETITION

SENIOR SEC 2022 AGO IWOYE DAY CELEBRATION QUIZ COMPETITION

10th - 12th Grade

75 Qs

Med Term & Terminology

Med Term & Terminology

9th - 12th Grade

78 Qs

AFJROTC General Knowledge

AFJROTC General Knowledge

9th - 12th Grade

83 Qs

Comptia Sec plus part 3

Comptia Sec plus part 3

Assessment

Quiz

Other

12th Grade

Medium

Created by

Breanna Norton

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

78 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Chief Information Security Officer (CISO) has instructed the information assurance staff to act upon a fast-spreading virus. Which of the following steps in the incident response process should be taken NEXT?

Identification

Eradication

Escalation

Containment

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An incident response analyst in a corporate security operations center receives a phone call from an SOC analyst. The SOC analyst explains the help desk recently reimaged a workstation that was suspected of being infected with an unknown type of malware; however, even after reimaging, the host continued to generate SIEM alerts. Which of the following types of malware is MOST likely responsible for producing the SIEM alerts?

Ransomware

Logic bomb

Rootkit

Adware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is performing a manual audit of captured data from a packet analyzer. The analyst looks for base64 encoded strings and applies the filter http.authbasic. Which of the following BEST describes what the analyst is looking for?

Unauthorized software

Unencrypted credentials

SSL certificate issues

Authentication tokens

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST explains why a development environment should have the same database server secure baseline that exists in production even if there is no PII in the database?

Without the same configuration in both development and production, there are no assurances that changes made in development will have the same effect in production.

Attackers can extract sensitive, personal information from lower development environment databases just as easily as they can from production databases

Databases are unique in their need to have secure configurations applied in all environments because they are attacked more often.

Laws stipulate that databases with the ability to store personal information must be secured regardless of the environment or if they actually have PII.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization wants to deliver streaming audio and video from its home office to remote locations all over the world. It wants the stream to be delivered securely and protected from intercept and replay attacks. Which of the following protocols is BEST suited for this purpose?

SSH

SIP

S/MIME

SRTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is being used when a malicious actor searches various social media websites to find information about a company's systems administrators and help desk staff?

Passive reconnaissance

Initial exploitation

Vulnerability scanning

Social engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security engineer is looking to purchase a fingerprint scanner to improve the security of a datacenter. Which of the following scanner characteristics is the MOST critical to successful implementation?

Low false rejection rate

High false rejection rate

High false acceptance rate

Low crossover error rate

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?