Search Header Logo

Security+4

Authored by Marco Lopez

Computers

University

Security+4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following allows for the attribution of messages to individuals?

Adaptive identity

Non-repudiation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

Automation

Compliance checklist

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

SCAP

DLP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization recently updated its security policy to include the following statement:
Regular expressions are included in source code to remove special characters such as $, |, ;. &, `, and ? from variables set by forms in a web application.
Which of the following best explains the security technique the organization adopted by making this addition to the policy?

Identify embedded keys

Input validation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst and the management team are reviewing the organizational performance of a recent phishing campaign. The user click-through rate exceeded the acceptable risk threshold, and the management team wants to reduce the impact when a user clicks on a link in a phishing message. Which of the following should the analyst do?

Place posters around the office to raise awareness of common phishing activities.

Update the EDR policies to block automatic execution of downloaded programs.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?

Compensating control

Network segmentation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The management team notices that new accounts that are set up manually do not always have correct access or permissions.
Which of the following automation techniques should a systems administrator use to streamline account creation?

Guard rail script

User provisioning script

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?