Search Header Logo

SEC+ 026-050

Authored by Team Spirit

Computers

1st Grade

Used 52+ times

SEC+ 026-050
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:26
Which of the following is the best reason to complete an audit in a banking environment?

Regulatory requirement

Organizational change

Self-assessment requirement

Service-level requirement

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Question #:27
A security analyst reviews domain activity logs and notices the following:

Which of the following is the best explanation for what the security analyst has discovered?

The user jsmith's account has been locked out.

A keylogger is installed on [smith's workstation

An attacker is attempting to brute force ismith's account.

Ransomware has been deployed in the domain.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:28
A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer data. Which of the following should the administrator do first?

Block access to cloud storage websites.

Create a rule to block outgoing email attachments

Apply classifications to the data.

Remove all user permissions from shares on the file server.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:29
Which of the following describes the process of concealing code or text inside a graphical image?

Symmetric encryption

Hashing

Data masking

Steganography

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Question #:30
Which of the following must be considered when designing a high-availability network? (Select two).

Ease of recovery

Ability to patch

Physical isolation

Responsiveness

Attack surface

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:31
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

SSO

LEAP

MFA

PEAP

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:32
Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?

Client


Third-party vendor

Cloud provider

DBA

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?