Search Header Logo

532 PT10

Authored by jaret valdez

Mathematics

University

532 PT10
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.231 The Chief Information Security Officer wants to pilot a new adaptive, user-based

authentication method. The concept Includes granting logical access based on physical location and

proximity. Which of the following Is the BEST solution for the pilot?

(A). Geofencing

(B). Self-sovereign identification

(C). PKl certificates

(D). SSO

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.232 A company needs to centralize its logs to create a baseline and have visibility on its security

events. Which of the following technologies will accomplish this objective?

(A). Security information and event management

(B). A web application firewall

(C). A vulnerability scanner

(D). A next-generation firewall

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.233 A system that requires an operation availability of 99.99% and has an annual maintenance

window available to patching and fixes will require the HIGHEST:

(A). MTBF

(B). MTTR

(C). RPO

(D). RTO

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.234 Which of the following is MOST likely to contain ranked and ordered information on the

likelihood and potential impact of catastrophic events that may affect business processes and

systems, while also highlighting the residual risks that need to be managed after mitigating controls

have been implemented?

(A). An RTO report

(B). A risk register

(C). A business impact analysis

(D). An asset value register

(E). A disaster recovery plan

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

NO.235 A security analyst has been asked to investigate a situation after the SOC started to receive

alerts from the SIEM. The analyst first looks at the domain controller and finds the following events:

To better understand what is going on, the analyst runs a command and receives the following

output:

Based on the analyst's findings, which of the following attacks is being executed?

(A). Credential harvesting

(B). Keylogger

(C). Brute-force

(D). Spraying

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.236 A SOC is currently being outsourced. Which of the following is being used?

(A). Microservices

(B). SaaS

(C). MSSP

(D). PaaS

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.237 The website http://companywebsite.com requires users to provide personal information including

security responses, for registration. which of the following would MOST likely cause a date breach

(A). LACK OF INPUT VALIDATION

(B). OPEN PERMISSIONS

(C). UNSCECURE PROTOCOL

(D). MISSING PATCHES

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?