BNS6 PT6

BNS6 PT6

University

28 Qs

quiz-placeholder

Similar activities

PERSAMAAN DAN FUNGSI KUADRAT KELAS IX

PERSAMAAN DAN FUNGSI KUADRAT KELAS IX

12th Grade - University

23 Qs

UH.1 Statistika

UH.1 Statistika

11th Grade - University

25 Qs

Intro to Python by AUG Problem solving module

Intro to Python by AUG Problem solving module

University - Professional Development

24 Qs

8 B-003- CLASIFICACION-EDO-TIPO-SOL

8 B-003- CLASIFICACION-EDO-TIPO-SOL

University

24 Qs

Boy Scout Questions

Boy Scout Questions

KG - Professional Development

24 Qs

VNPT Check

VNPT Check

University

24 Qs

Quiz#1: Circuit Analysis II - Complex Numbers

Quiz#1: Circuit Analysis II - Complex Numbers

University

25 Qs

BAB 1 - BAB 4

BAB 1 - BAB 4

University

23 Qs

BNS6 PT6

BNS6 PT6

Assessment

Quiz

Mathematics

University

Practice Problem

Hard

Created by

jaret valdez

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?

  1. An attacker is sniffing traffic to port 53, and the server is managed using unencrypted usernames and passwords.

  1. An organization is experiencing excessive traffic on port 53 and suspects an attacker is trying to DoS

the domain name server

  1. Malware trying to resolve an unregistered domain name to determine if it is running in an isolated sandbox

  1. Routing tables have been compromised, and an attacker is rerouting traffic to malicious websites

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility.

Which of the following MOST likely the cause of the cause of the access issues?

  1. False rejection

  1. Cross-over error rate

  1. Efficacy rale

Attestation

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial opinion article in a national newspaper, which may result in new cyberattacks.

Which of the following would be BEST for the security manager to use in a threat model?

  1. Hacktivists

  1. White-hat hackers

  1. Script kiddies

  1. Insider threats

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?

  1. Tokenization

  1. Data masking

  1. Normalization

Obfuscation

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?

TLS

PFS

ESP

AH

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A company has determined that if its computer-based manufacturing is not functioning for 12 consecutive hours, it will lose more money that it costs to maintain the equipment. Which of the following must be less than 12 hours to maintain a positive total cost of ownership?

  1. MTBF

RPO

RTO

MTTR

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following control sets should a well -written BCP include? (Select THREE)

  1. Preventive

  1. Detective

  1. Corrective

  1. Recovery

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?