CAS004: Set 1

CAS004: Set 1

University

10 Qs

quiz-placeholder

Similar activities

ICT (Configure User Access)

ICT (Configure User Access)

University

15 Qs

Pertemuan 1 Evaluasi Materi Proxy Kelas XII

Pertemuan 1 Evaluasi Materi Proxy Kelas XII

University

10 Qs

Computer Security - Internet Vulnerabilities

Computer Security - Internet Vulnerabilities

University

15 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Common Components of a Network

Common Components of a Network

University

14 Qs

Understand network protocols

Understand network protocols

University

10 Qs

Windows Server Services

Windows Server Services

University

15 Qs

Sec+ Book Questions Ch. 5 1/2

Sec+ Book Questions Ch. 5 1/2

University

10 Qs

CAS004: Set 1

CAS004: Set 1

Assessment

Quiz

Computers

University

Hard

Created by

Khairul Imtiyaz

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should a security engineer recommend to meet the requirements of achieving 99.99% uptime, load time in 3 seconds, and response time <10 seconds?

Employing bare-metal loading of applications

Implementing server clusters

Deploying a content delivery network

Installing a firewall at corporate headquarters

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should a security analyst do FIRST upon receiving SIEM alerts about compromised accounts and exploited vulnerabilities?

Disable Administrator on abc-uaa-fsl, the local account is compromised

Shut down the abc-usa-fsl server, a plaintext credential is being used

Disable the jdoe account, it is likely compromised

Shut down abc-usa-fw01; the remote access VPN vulnerability is exploited

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following should a managed security provider put in place to secure a cloud server environment similar to on-premises infrastructure?

Microsegmentation

Virtual next-generation firewall

Web application firewall

External vulnerability scans

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the BEST solution a security architect can propose to improve security measures against the latest threats, including recognizing and blocking fake websites?

Web filtering

CASB

EDR

NGFW

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology would be the BEST option to improve the security of web applications running on in-house servers, including terminating SSL connections at a central location?

API gateway

ESB gateway

XML gateway

WAF

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To prevent an outage due to DDoS attacks, what is the MOST important infrastructure security design element for a major broadcasting company requiring continuous availability to streaming content?

Supporting heterogeneous architecture

Leveraging content delivery network across multiple regions

Ensuring cloud autoscaling is in place

Scaling horizontally to handle increases in traffic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To identify weaknesses earlier in the development process and reduce the time to identify serverless application vulnerabilities, what would BEST accomplish the objectives of a SaaS startup maturing its DevSecOps program?

RASP

SAST

WAF

CMS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?