Search Header Logo

Bns6pt3

Authored by jaret valdez

Mathematics

University

Bns6pt3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The security administrator isolated the switch on a separate VLAN and set up a patch routine. Which of the following steps should also be taken to harden the smart switch?

  1. Set up an air gap for the switch.

  1. Change the default password for the switch.

  1. Place the switch In a Faraday cage.

  1. Install a cable lock on the switch

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following describes the BEST approach for deploying application patches?

  1. Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.

  1. Test the patches in a staging environment, develop against them in the development environment, and then apply them to the production systems

  1. Test the patches m a test environment apply them to the production systems and then apply them to a staging environment

  1. Apply the patches to the production systems apply them in a staging environment, and then test all of them in a testing environment

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security engineer needs to enhance MA access to sensitive areas in a building. A key card and fingerprint scan are already in use. Which of the following would add another factor of authentication?

  1. Hard token

  1. Retina scan

  1. SMS text

  1. Keypad PIN

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A symmetric encryption algorithm is BEST suited for:

  1. key-exchange scalability.

  1. protecting large amounts of data.

  1. providing hashing capabilities,

  1. implementing non-repudiation.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company has limited storage available and online presence that cannot for more than four hours. Which of the following backup methodologies should the company implement to allow for the FASTEST database restore time In the event of a failure, which being maindful of the limited available storage space?

  1. Implement fulltape backup every Sunday at 8:00 p.m and perform nightly tape rotations.

  1. Implement different backups every Sunday at 8:00 and nightly incremental backups at 8:00 p.m

  1. Implement nightly full backups every Sunday at 8:00 p.m

  1. Implement full backups every Sunday at 8:00 p.m and nightly differential backups at 8:00

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst is reviewing information regarding recent vulnerabilities. Which of the following will the analyst MOST likely consult to validate which platforms have been affected?

  1. OSINT

  1. SIEM

  1. CVSS

  1. CVE

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst needs to produce a document that details how a security incident occurred, the steps that were taken for recovery, and how tuture incidents can be avoided. During which ot the following stages of the response process will this activity take place?

  1. Recovery

  1. Identification

  1. Lessons learned

  1. Preparation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?