Search Header Logo

CompTIA Review #2

Authored by Jay Thapar

Computers

12th Grade

Used 4+ times

CompTIA Review #2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is best to use when determining the severity of a vulnerability?

CVE

OSINT

SOAR

CVSS

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A systems administrator is auditing all company servers to ensure they meet the minimum security baseline While auditing a Linux server the systems administrator observes the /etc/ahadow file has permissions beyond the baseline recommendation. Which of the following commands should the systems administrator use to resolve this issue?

chmod

grep

dd

passwd

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?

Implementing encryption

Monitoring outbound traffic

Using default settings

Closing all open ports

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Local guidelines require that all information systems meet a minimum security baseline to be compliant. Which of the following can security administrators use to assess their system configurations against the baseline?

SOAR playbook

Security control matrix

Risk management framework

Benchmarks

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization is concerned about intellectual property theft by employees who leave the organization. Which of the following should the organization most likely implement?

CBT

NDA

MOU

AUP

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an incident and prioritize the sequence for performing forensic analysis?

Order of volatilitiy

Preservation of event logs

Chain of custody

Compliance with legal hold

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst has been tasked with ensuring all programs that are deployed into the enterprise have been assessed in a runtime environment Any critical issues found in the program must be sent back to the developer for verification and remediation. Which of the following describes the type of assessment taking place?

Input validation

Dynamic code analysis

Fuzzing

Manual code review

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?