Comptia sec plus part 5

Comptia sec plus part 5

12th Grade

79 Qs

quiz-placeholder

Similar activities

Review for Respiratory System Test

Review for Respiratory System Test

10th - 12th Grade

75 Qs

Ortografía Guía

Ortografía Guía

1st Grade - University

81 Qs

Sewing Machine

Sewing Machine

9th - 12th Grade

81 Qs

Level 2 - Scientific Principles & Electrical MEGA QUIZ

Level 2 - Scientific Principles & Electrical MEGA QUIZ

12th Grade

75 Qs

TRY OUT UTBK 2024

TRY OUT UTBK 2024

12th Grade

80 Qs

sử ....

sử ....

12th Grade - University

79 Qs

ACT English 59F

ACT English 59F

10th - 12th Grade

75 Qs

Transformar Verbal Prueba

Transformar Verbal Prueba

12th Grade

78 Qs

Comptia sec plus part 5

Comptia sec plus part 5

Assessment

Quiz

Other

12th Grade

Medium

Created by

Breanna Norton

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

79 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks is used to capture the WPA2 handshake?

Replay

IV

Evil twin

Dissociation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security engineer is looking to purchase a fingerprint scanner to improve the security of a datacenter. Which of the following scanner characteristics is the MOST critical to successful implementation?

Low false rejection rate

High false rejection rate

High false acceptance rate

Low crossover error rate

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system uses an application server and database server. Employing the principle of least privilege, only database administrators are given administrative privileges on the database server, and only application team members are given administrative privileges on the application server Audit and log file reviews are performed by the business unit (a separate group from the database and application teams). The organization wants to optimize operational efficiency when application or database changes are needed, but it also wants to enforce least privilege, prevent modification of log files, and facilitate the audit and log review performed by the business unit. Which of the following approaches would BEST meet the organization’s goals?

Restrict privileges on the log file directory to “read only” and use a service account to send a copy of these files to the business unit.

Switch administrative privileges for the database and application servers. Give the application team administrative privileges on the database servers and the database team administrative privileges on the application servers.

Give the business unit administrative privileges on both the database and application servers so they can independently monitor server activity.

Remove administrative privileges from both the database and application servers, and give the business unit “read only” privileges on the directories where the log files are kept.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst runs the following command: netstat –anb :

Based on the above information, with which of the following types of malware is the server MOST likely infected?

Worm

RAT

Keylogger

Adware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator if researching ways to improve the security of a manufacturing company’s systems within the next three to six months. Which of the following would provide the security administrator with the MOST diverse perspective?

Platform-specific security benchmark for the company’s specific systems

Manufacturing security auditing requirements

Academic security research on emerging technologies

Security regulations from other industry verticals

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a risk assessment, results show that a fire in one of the company’s datacenters could cost up to $20 million in equipment damages and lost revenue. As a result, the company insures the datacenter for up to $20 million in damages for the cost of $30,000 a year. Which of the following risk response techniques has the company chosen?

Transference

Avoidance

Mitigation

Acceptance

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization’s help desk is flooded with phone calls from users stating they can no longer access certain websites. The help desk escalates the issue to the security team, as these websites were accessible the previous day. The security analysts run the following command ipconfig /flushdns, but the issue persists. Finally, an analyst changes the DNS server for an impacted machine, and the issue goes away. Which of the following attacks MOST likely occurred on the original DNS server?

DNS cache poisoning

Domain hijacking

Distributed denial-of-service

DNS tunneling

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?