
Security+4
Authored by Marco Lopez
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following allows for the attribution of messages to individuals?
Adaptive identity
Non-repudiation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?
Automation
Compliance checklist
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?
SCAP
DLP
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization recently updated its security policy to include the following statement:
Regular expressions are included in source code to remove special characters such as $, |, ;. &, `, and ? from variables set by forms in a web application.
Which of the following best explains the security technique the organization adopted by making this addition to the policy?
Identify embedded keys
Input validation
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst and the management team are reviewing the organizational performance of a recent phishing campaign. The user click-through rate exceeded the acceptable risk threshold, and the management team wants to reduce the impact when a user clicks on a link in a phishing message. Which of the following should the analyst do?
Place posters around the office to raise awareness of common phishing activities.
Update the EDR policies to block automatic execution of downloaded programs.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?
Compensating control
Network segmentation
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The management team notices that new accounts that are set up manually do not always have correct access or permissions.
Which of the following automation techniques should a systems administrator use to streamline account creation?
Guard rail script
User provisioning script
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?