SEC+ 026-050

SEC+ 026-050

1st Grade

25 Qs

quiz-placeholder

Similar activities

TET Holiday

TET Holiday

1st - 10th Grade

20 Qs

Excel - podstawowe obliczenia

Excel - podstawowe obliczenia

1st - 5th Grade

24 Qs

TIN HỌC 5 - SÁCH HDTH (ÔN HK2 NĂM 2023-2024)

TIN HỌC 5 - SÁCH HDTH (ÔN HK2 NĂM 2023-2024)

1st - 5th Grade

25 Qs

Quiz on ICT class V

Quiz on ICT class V

KG - 5th Grade

20 Qs

Class 1 L-  3 & 4.  CW Practice questions

Class 1 L- 3 & 4. CW Practice questions

1st Grade

20 Qs

Ôn tập cuối học kì 1 môn Tin lớp 4 năm học 2021-2022

Ôn tập cuối học kì 1 môn Tin lớp 4 năm học 2021-2022

1st - 4th Grade

27 Qs

ICT GRADE 1 Second Term Examination 2019/2020

ICT GRADE 1 Second Term Examination 2019/2020

1st Grade

20 Qs

Podstawowe pojęcia z informatyki1

Podstawowe pojęcia z informatyki1

1st - 6th Grade

20 Qs

SEC+ 026-050

SEC+ 026-050

Assessment

Quiz

Computers

1st Grade

Easy

Created by

Team Spirit

Used 52+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:26
Which of the following is the best reason to complete an audit in a banking environment?

Regulatory requirement

Organizational change

Self-assessment requirement

Service-level requirement

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Question #:27
A security analyst reviews domain activity logs and notices the following:

Which of the following is the best explanation for what the security analyst has discovered?

The user jsmith's account has been locked out.

A keylogger is installed on [smith's workstation

An attacker is attempting to brute force ismith's account.

Ransomware has been deployed in the domain.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:28
A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer data. Which of the following should the administrator do first?

Block access to cloud storage websites.

Create a rule to block outgoing email attachments

Apply classifications to the data.

Remove all user permissions from shares on the file server.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:29
Which of the following describes the process of concealing code or text inside a graphical image?

Symmetric encryption

Hashing

Data masking

Steganography

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Question #:30
Which of the following must be considered when designing a high-availability network? (Select two).

Ease of recovery

Ability to patch

Physical isolation

Responsiveness

Attack surface

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:31
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

SSO

LEAP

MFA

PEAP

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:32
Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?

Client


Third-party vendor

Cloud provider

DBA

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?