532 PT 11

532 PT 11

University

25 Qs

quiz-placeholder

Similar activities

Domain and Range of Linear Functions

Domain and Range of Linear Functions

9th Grade - University

20 Qs

SAT Geometry Practice Questions

SAT Geometry Practice Questions

11th Grade - University

20 Qs

Quadratic Characteristics

Quadratic Characteristics

8th Grade - University

22 Qs

Mathematics

Mathematics

University

20 Qs

Identify Independent and Dependent Quantities from Tables and Graphs

Identify Independent and Dependent Quantities from Tables and Graphs

6th Grade - University

20 Qs

Law of Sines and Cosines

Law of Sines and Cosines

12th Grade - University

20 Qs

Simplification of Algebraic Fractions

Simplification of Algebraic Fractions

12th Grade - University

20 Qs

One Step Equation Fun

One Step Equation Fun

8th Grade - University

20 Qs

532 PT 11

532 PT 11

Assessment

Quiz

Mathematics

University

Hard

Created by

jaret valdez

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.256 An organization's corporate offices were destroyed due to a natural disaster, so the

organization is now setting up offices in a temporary work space. Which of the following will the

organization MOST likely consult?

(A). The business continuity plan

(B). The disaster recovery plan

.(C). The communications plan

(D). The incident response plan

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.257 Which of the following describes the ability of code to target a hypervisor from inside

(A). Fog computing

(B). VM escape

(C). Software-defined networking

(D). Image forgery

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.258 An information security policy stales that separation of duties is required for all highly

sensitive database changes that involve customers' financial data. Which of the following will this be

BEST to prevent?

(A). Least privilege

(B). An insider threat

(C). A data breach

(D). A change control violation

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.259 A user recent an SMS on a mobile phone that asked for bank delays. Which of the following

social-engineering techniques was used in this case?

(A). SPIM

(B). Vishing

(C). Spear phishing

(D). Smishing

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.260 A company wants to deploy PKI on its Internet-facing website. The applications that are

currently deployed are:

* www.company.com (main website)

* contactus.company.com (for locating a nearby location)

* quotes.company.com (for requesting a price quote)

The company wants to purchase one SSL certificate that will work for all the existing applications and

any future applications that follow the same naming conventions, such as store.company.com. Which

of the following certificate types would BEST meet the requirements?

A. SAN

B. Wildcard

C. Extended validation

D. self-signed

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.261 An attack relies on an end user visiting a website the end user would typically visit, however,

the site is compromised and uses vulnerabilities in the end users browser to deploy malicious

software. Which of the blowing types of attack does this describe?

(A). Smishing

(B). Whaling

(C). Watering hole

(D). Phishing

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

NO.262 Which of the following will MOST likely adversely impact the operations of unpatched

traditional programmable-logic controllers, running a back-end LAMP server and OT systems with

human-management interfaces that are accessible over the Internet via a web interface? (Choose

two.)

(A). Cross-site scripting

(B). Data exfiltration

(C). Poor system logging

(D). Weak encryption

(F). Server-side request forgery

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?