Search Header Logo

532 PT 11

Authored by jaret valdez

Mathematics

University

532 PT 11
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.256 An organization's corporate offices were destroyed due to a natural disaster, so the

organization is now setting up offices in a temporary work space. Which of the following will the

organization MOST likely consult?

(A). The business continuity plan

(B). The disaster recovery plan

.(C). The communications plan

(D). The incident response plan

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.257 Which of the following describes the ability of code to target a hypervisor from inside

(A). Fog computing

(B). VM escape

(C). Software-defined networking

(D). Image forgery

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.258 An information security policy stales that separation of duties is required for all highly

sensitive database changes that involve customers' financial data. Which of the following will this be

BEST to prevent?

(A). Least privilege

(B). An insider threat

(C). A data breach

(D). A change control violation

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.259 A user recent an SMS on a mobile phone that asked for bank delays. Which of the following

social-engineering techniques was used in this case?

(A). SPIM

(B). Vishing

(C). Spear phishing

(D). Smishing

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.260 A company wants to deploy PKI on its Internet-facing website. The applications that are

currently deployed are:

* www.company.com (main website)

* contactus.company.com (for locating a nearby location)

* quotes.company.com (for requesting a price quote)

The company wants to purchase one SSL certificate that will work for all the existing applications and

any future applications that follow the same naming conventions, such as store.company.com. Which

of the following certificate types would BEST meet the requirements?

A. SAN

B. Wildcard

C. Extended validation

D. self-signed

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.261 An attack relies on an end user visiting a website the end user would typically visit, however,

the site is compromised and uses vulnerabilities in the end users browser to deploy malicious

software. Which of the blowing types of attack does this describe?

(A). Smishing

(B). Whaling

(C). Watering hole

(D). Phishing

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

NO.262 Which of the following will MOST likely adversely impact the operations of unpatched

traditional programmable-logic controllers, running a back-end LAMP server and OT systems with

human-management interfaces that are accessible over the Internet via a web interface? (Choose

two.)

(A). Cross-site scripting

(B). Data exfiltration

(C). Poor system logging

(D). Weak encryption

(F). Server-side request forgery

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?