SEC+ 026-050

SEC+ 026-050

1st Grade

25 Qs

quiz-placeholder

Similar activities

Cybersecurityawareness2024

Cybersecurityawareness2024

1st - 5th Grade

20 Qs

Unit 6 - The Bigger Picture

Unit 6 - The Bigger Picture

1st - 10th Grade

23 Qs

Welcome to the Web

Welcome to the Web

1st - 3rd Grade

22 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

Internet Safety

Internet Safety

KG - 3rd Grade

20 Qs

CompTIA Network+ (221-240)

CompTIA Network+ (221-240)

1st Grade

20 Qs

Pentadbiran Server

Pentadbiran Server

1st - 12th Grade

21 Qs

DIGITAL SKILLS LEVEL 1 QUIZ 1

DIGITAL SKILLS LEVEL 1 QUIZ 1

1st - 9th Grade

21 Qs

SEC+ 026-050

SEC+ 026-050

Assessment

Quiz

Computers

1st Grade

Easy

Created by

Team Spirit

Used 52+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:26
Which of the following is the best reason to complete an audit in a banking environment?

Regulatory requirement

Organizational change

Self-assessment requirement

Service-level requirement

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Question #:27
A security analyst reviews domain activity logs and notices the following:

Which of the following is the best explanation for what the security analyst has discovered?

The user jsmith's account has been locked out.

A keylogger is installed on [smith's workstation

An attacker is attempting to brute force ismith's account.

Ransomware has been deployed in the domain.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:28
A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer data. Which of the following should the administrator do first?

Block access to cloud storage websites.

Create a rule to block outgoing email attachments

Apply classifications to the data.

Remove all user permissions from shares on the file server.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:29
Which of the following describes the process of concealing code or text inside a graphical image?

Symmetric encryption

Hashing

Data masking

Steganography

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Question #:30
Which of the following must be considered when designing a high-availability network? (Select two).

Ease of recovery

Ability to patch

Physical isolation

Responsiveness

Attack surface

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:31
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

SSO

LEAP

MFA

PEAP

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:32
Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?

Client


Third-party vendor

Cloud provider

DBA

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?