
532 PT 11
Authored by jaret valdez
Mathematics
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.256 An organization's corporate offices were destroyed due to a natural disaster, so the
organization is now setting up offices in a temporary work space. Which of the following will the
organization MOST likely consult?
(A). The business continuity plan
(B). The disaster recovery plan
.(C). The communications plan
(D). The incident response plan
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.257 Which of the following describes the ability of code to target a hypervisor from inside
(A). Fog computing
(B). VM escape
(C). Software-defined networking
(D). Image forgery
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.258 An information security policy stales that separation of duties is required for all highly
sensitive database changes that involve customers' financial data. Which of the following will this be
BEST to prevent?
(A). Least privilege
(B). An insider threat
(C). A data breach
(D). A change control violation
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.259 A user recent an SMS on a mobile phone that asked for bank delays. Which of the following
social-engineering techniques was used in this case?
(A). SPIM
(B). Vishing
(C). Spear phishing
(D). Smishing
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.260 A company wants to deploy PKI on its Internet-facing website. The applications that are
currently deployed are:
* www.company.com (main website)
* contactus.company.com (for locating a nearby location)
* quotes.company.com (for requesting a price quote)
The company wants to purchase one SSL certificate that will work for all the existing applications and
any future applications that follow the same naming conventions, such as store.company.com. Which
of the following certificate types would BEST meet the requirements?
A. SAN
B. Wildcard
C. Extended validation
D. self-signed
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.261 An attack relies on an end user visiting a website the end user would typically visit, however,
the site is compromised and uses vulnerabilities in the end users browser to deploy malicious
software. Which of the blowing types of attack does this describe?
(A). Smishing
(B). Whaling
(C). Watering hole
(D). Phishing
7.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
NO.262 Which of the following will MOST likely adversely impact the operations of unpatched
traditional programmable-logic controllers, running a back-end LAMP server and OT systems with
human-management interfaces that are accessible over the Internet via a web interface? (Choose
two.)
(A). Cross-site scripting
(B). Data exfiltration
(C). Poor system logging
(D). Weak encryption
(F). Server-side request forgery
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?