
Bns6
Authored by jaret valdez
Mathematics
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
102 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will use data feeds obtained from passport systems, passenger manifests, and high- definition video feeds from CCTV systems that are located at the ports. The service will incorporate machine-learning techniques to eliminate biometric enrollment processes while still allowing authorities to identify passengers with increasing accuracy over time. The more frequently passengers travel, the more accurately the service will identify them.
Which of the following biometrics will MOST likely be used, without the need for enrollment?
Voice
Gait
Vein
Facial
Retina
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A small company that does not have security staff wants to improve its security posture. Which of the following would BEST assist the company?
MSSP
SOAR
laaS
PaaS
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization's help desk is flooded with phone calls from users stating they can no longer access certain websites. The help desk escalates the issue to the security team, as these websites were accessible the previous day. The security analysts run the following command: ipconfig /flushdns, but the issue persists. Finally, an analyst changes the DNS server for an impacted machine, and the issue goes away. Which of the following attacks MOST likely occurred on the original DNS server?
DNS cache poisoning
Domain hijacking
Distributed denial-of-service
DNS tunneling
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the company, its facilities, its data, and its staff. Which of the following describes what the manager is doing?
Developing an incident response plan
Building a disaster recovery plan
Conducting a tabletop exercise
Running a simulation exercise
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A RAT that was used to compromise an organization's banking credentials was found on a user's computer. The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set. Which of the following recommendations would BEST prevent this from reoccurring?
Create a new acceptable use policy.
Segment the network into trusted and untrusted zones.
Enforce application whitelisting.
Implement DLP at the network boundary.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst is reviewing a new website that will soon be made publicly available. The analyst sees the following in the URL:
http://dev-site.comptia.org/home/show.php?sessionID=77276554&loc=us
The analyst then sends an internal user a link to the new website for testing purposes, and when the user clicks the link, the analyst is able to browse the website with the following URL:
http://dev-site.comptia.org/home/show.php?sessionID=98988475&loc=us
Which of the following application attacks is being tested?
Pass-the-hash
Session replay
Object deference
Cross-site request forgery
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator has been asked to install an IDS to improve the security posture of an organization. Which of the following control types is an IDS?
Corrective
Physical
Detective
Administrative
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?