Search Header Logo

CAS004: Set 13

Authored by Khairul Imtiyaz

Computers

University

CAS004: Set 13
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization developed a social media application that is used by customers in multiple remote geographic locations around the world. The organization's headquarters and only data center are located in New York City. The Chief Information Security Officer wants to ensure specific requirements are met for the social media application. Which of the following should the organization implement to BEST ensure all requirements are met?

A cache server farm in its data center

A load-balanced group of reverse proxy servers with SSL acceleration

A CDN with the origin set to its data center

Dual gigabit-speed Internet connections with managed DDoS prevention

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator is preparing to run a vulnerability scan on a set of information systems in the organization. The systems administrator wants to ensure that the targeted systems produce accurate information especially regarding configuration settings. Which of the following scan types will provide the systems administrator with the MOST accurate information?

A passive, credentialed scan

A passive, non-credentialed scan

An active, non-credentialed scan

An active, credentialed scan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is repeatedly being breached by hackers who valid credentials. The company's Chief Information Security Officer (CISO) has installed multiple controls for authenticating users, including biometric and token-based factors. An external consultant is evaluating the process currently in place to support the authentication controls. Which of the following recommendation would MOST likely reduce the risk of unauthorized access?

Implement strict three-factor authentication

Implement least privilege policies

Switch to one-time or all user authorizations

Strengthen identity-proofing procedures

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following represents the MOST significant benefit of implementing a passwordless authentication solution?

Biometric authenticators are immutable.

The likelihood of account compromise is reduced.

Zero trust is achieved.

Privacy risks are minimized.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company's product site recently had failed API calls, resulting in customers being unable to check out and purchase products. This type of failure could lead to the loss of customers and damage to the company's reputation in the market. Which of the following should the company implement to address the risk of system unavailability?

User and entity behavior analytics

Redundant reporting systems

A self-healing system

Application controls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Given the following log snippet from a web server: Which of the following BEST describes this type of attack?

SQL injection

Cross-site scripting

Brute-force

Cross-site request forgery

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

The OS on several servers crashed around the same time for an unknown reason. The servers were restored to working condition, and all file integrity was verified. Which of the following should the incident response team perform to understand the crash and prevent it in the future?

Root cause analysis

Continuity of operations plan

After-action report

Lessons learned

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?