CompTIA Review #2

CompTIA Review #2

12th Grade

11 Qs

quiz-placeholder

Similar activities

Security+_Domain_4

Security+_Domain_4

CompTIA Security+ Practice Test 2

CompTIA Security+ Practice Test 2

Sec Review 3

Sec Review 3

CompTIA Security+ Chapter 1 - 4

CompTIA Security+ Chapter 1 - 4

CompTIA Review #4

CompTIA Review #4

Introduction to Cybersecurity

Introduction to Cybersecurity

CompTIA Review #2

CompTIA Review #2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Jay Thapar

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is best to use when determining the severity of a vulnerability?

CVE

OSINT

SOAR

CVSS

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A systems administrator is auditing all company servers to ensure they meet the minimum security baseline While auditing a Linux server the systems administrator observes the /etc/ahadow file has permissions beyond the baseline recommendation. Which of the following commands should the systems administrator use to resolve this issue?

chmod

grep

dd

passwd

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?

Implementing encryption

Monitoring outbound traffic

Using default settings

Closing all open ports

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Local guidelines require that all information systems meet a minimum security baseline to be compliant. Which of the following can security administrators use to assess their system configurations against the baseline?

SOAR playbook

Security control matrix

Risk management framework

Benchmarks

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization is concerned about intellectual property theft by employees who leave the organization. Which of the following should the organization most likely implement?

CBT

NDA

MOU

AUP

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an incident and prioritize the sequence for performing forensic analysis?

Order of volatilitiy

Preservation of event logs

Chain of custody

Compliance with legal hold

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst has been tasked with ensuring all programs that are deployed into the enterprise have been assessed in a runtime environment Any critical issues found in the program must be sent back to the developer for verification and remediation. Which of the following describes the type of assessment taking place?

Input validation

Dynamic code analysis

Fuzzing

Manual code review

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?