
CAS004: Set 13
Authored by Khairul Imtiyaz
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization developed a social media application that is used by customers in multiple remote geographic locations around the world. The organization's headquarters and only data center are located in New York City. The Chief Information Security Officer wants to ensure specific requirements are met for the social media application. Which of the following should the organization implement to BEST ensure all requirements are met?
A cache server farm in its data center
A load-balanced group of reverse proxy servers with SSL acceleration
A CDN with the origin set to its data center
Dual gigabit-speed Internet connections with managed DDoS prevention
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A systems administrator is preparing to run a vulnerability scan on a set of information systems in the organization. The systems administrator wants to ensure that the targeted systems produce accurate information especially regarding configuration settings. Which of the following scan types will provide the systems administrator with the MOST accurate information?
A passive, credentialed scan
A passive, non-credentialed scan
An active, non-credentialed scan
An active, credentialed scan
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is repeatedly being breached by hackers who valid credentials. The company's Chief Information Security Officer (CISO) has installed multiple controls for authenticating users, including biometric and token-based factors. An external consultant is evaluating the process currently in place to support the authentication controls. Which of the following recommendation would MOST likely reduce the risk of unauthorized access?
Implement strict three-factor authentication
Implement least privilege policies
Switch to one-time or all user authorizations
Strengthen identity-proofing procedures
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following represents the MOST significant benefit of implementing a passwordless authentication solution?
Biometric authenticators are immutable.
The likelihood of account compromise is reduced.
Zero trust is achieved.
Privacy risks are minimized.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company's product site recently had failed API calls, resulting in customers being unable to check out and purchase products. This type of failure could lead to the loss of customers and damage to the company's reputation in the market. Which of the following should the company implement to address the risk of system unavailability?
User and entity behavior analytics
Redundant reporting systems
A self-healing system
Application controls
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Given the following log snippet from a web server: Which of the following BEST describes this type of attack?
SQL injection
Cross-site scripting
Brute-force
Cross-site request forgery
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
The OS on several servers crashed around the same time for an unknown reason. The servers were restored to working condition, and all file integrity was verified. Which of the following should the incident response team perform to understand the crash and prevent it in the future?
Root cause analysis
Continuity of operations plan
After-action report
Lessons learned
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?