Which of the following is used to protect a computer from viruses, malware, and Trojans being installed and moving laterally across the network?
SEC+ 76-100

Quiz
•
Computers
•
1st Grade
•
Easy

Team Spirit
Used 40+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
IDS
ACL
EDR
NAC
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following should a security administrator adhere to when setting up a new set of firewall rules?
Disaster recovery plan
Incident response procedure
Business continuity plan
Change management procedure
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?
Jump server
RADIUS
HSM
Load balancer
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10.50.10.25. Which of the following firewall ACLs will accomplish this goal?
Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53 Access list outbound deny 10.50.10.25/32 0.0.0.0/0 port 53
Access list outbound permit 0.0.0.0/0 10.50.10.25/32 port 53 Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53
Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?
Fines
Audit findings
Sanctions
Reputation damage
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?
Implementing a bastion host
Deploying a perimeter network
Installing a WAF
Utilizing single sign-on
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations. Which of the following should the hosting provider consider first?
Local data protection regulations
Risks from hackers residing in other countries
Impacts to existing contractual obligations
Time zone differences in log correlation
Create a free account and access millions of resources
Similar Resources on Quizizz
24 questions
KS3 Networking Quiz

Quiz
•
1st - 3rd Grade
20 questions
COMPUTER TEST

Quiz
•
1st - 7th Grade
20 questions
Pretest HCIA Day 1

Quiz
•
1st - 4th Grade
20 questions
computer revison questions

Quiz
•
1st - 8th Grade
20 questions
Network ports

Quiz
•
1st Grade - University
25 questions
SEC+ 026-050

Quiz
•
1st Grade
24 questions
Ultimate Wi-Fi Explorer Quiz

Quiz
•
1st - 5th Grade
26 questions
Cisco Meraki_test

Quiz
•
1st Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade