Security+2

Security+2

University

20 Qs

quiz-placeholder

Similar activities

Security+_Domain_4

Security+_Domain_4

Sec+ review

Sec+ review

SEC+ Quiz1

SEC+ Quiz1

Chapter 7 Review

Chapter 7 Review

Cybersecurity Quiz

Cybersecurity Quiz

Security+2

Security+2

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Marco Lopez

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a security incident, the security operations team identified sustained network traffic from a malicious IP address: 10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization’s network. Which of the following fulfills this request?

access-list inbound deny ip source 0.0.0.0/0 destination 10.1.4.9/32

access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?

Implementing a bastion host

Deploying a perimeter network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?

Application

Endpoint

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks.
SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?

Digital forensics

Threat hunting

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?

Accept

Transfer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator would like to protect data on employees’ laptops. Which of the following encryption techniques should the security administrator use?

Partition

Full disk

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security control types does an acceptable use policy best represent?

Detective

Preventive

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?