
CompTIA Review #2
Quiz
•
Computers
•
12th Grade
•
Medium
Jay Thapar
Used 4+ times
FREE Resource
Enhance your content in a minute
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is best to use when determining the severity of a vulnerability?
CVE
OSINT
SOAR
CVSS
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A systems administrator is auditing all company servers to ensure they meet the minimum security baseline While auditing a Linux server the systems administrator observes the /etc/ahadow file has permissions beyond the baseline recommendation. Which of the following commands should the systems administrator use to resolve this issue?
chmod
grep
dd
passwd
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?
Implementing encryption
Monitoring outbound traffic
Using default settings
Closing all open ports
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Local guidelines require that all information systems meet a minimum security baseline to be compliant. Which of the following can security administrators use to assess their system configurations against the baseline?
SOAR playbook
Security control matrix
Risk management framework
Benchmarks
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An organization is concerned about intellectual property theft by employees who leave the organization. Which of the following should the organization most likely implement?
CBT
NDA
MOU
AUP
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a reason why a forensic specialist would create a plan to preserve data after an incident and prioritize the sequence for performing forensic analysis?
Order of volatilitiy
Preservation of event logs
Chain of custody
Compliance with legal hold
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst has been tasked with ensuring all programs that are deployed into the enterprise have been assessed in a runtime environment Any critical issues found in the program must be sent back to the developer for verification and remediation. Which of the following describes the type of assessment taking place?
Input validation
Dynamic code analysis
Fuzzing
Manual code review
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
55 questions
CHS Holiday Trivia
Quiz
•
12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
