
PRACTICE EXAM - 116 QUESTIONS
Quiz
•
Information Technology (IT)
•
Professional Development
•
Easy
Alliyah Estrada
Used 130+ times
FREE Resource
Student preview

116 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 20 pts
A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers a few of the links and discovers that the links do not correspond to links associated with the company. Which of the following attack vectors is most likely being used?
Social Engineering
Default Password
Business Email
Unsecured Network
Answer explanation
The attack vector most likely being used is Social Engineering.
This scenario suggests a phishing attempt, where an attacker is trying to deceive the new employee by sending a fake onboarding email with malicious links that do not correspond to legitimate company links.
2.
MULTIPLE CHOICE QUESTION
1 min • 20 pts
A company is located to an area prone to hurricanes is developing a disaster recovery plan and looking at site considerations that allow the company to immediately continue operations. Which of the following is the best type of site for this company?
Warm
Tertiary
Hot
Cold
Answer explanation
The best type of site for this company is Hot.
A hot site is a fully operational, ready-to-go site with all the necessary hardware, software, and data backups. It allows a company to immediately continue operations with minimal downtime, which is crucial for a company in a hurricane-prone area.
4o
3.
MULTIPLE CHOICE QUESTION
1 min • 20 pts
A bank setup a new server that contains customer's PII. Which of the following should the bank use to make sure the sensitive data is not modified?
Network access control
Full disk encryption
User behavior analytics
File Integrity Monitoring
Answer explanation
The bank should use File Integrity Monitoring.
File Integrity Monitoring (FIM) is designed to ensure that sensitive data, such as customers' Personally Identifiable Information (PII), is not modified without authorization. It continuously monitors and alerts on any changes to critical files, ensuring data integrity.
4.
MULTIPLE CHOICE QUESTION
1 min • 20 pts
An organization wants to limit potential impact to its log-in database on the event of breach. Which of the following options is the security team most likely to recommend?
Hashing
Tokenization
Obfuscation
Segmentation
Answer explanation
The security team is most likely to recommend Hashing.
Hashing is a cryptographic technique that converts passwords into a fixed-size string of characters, which is irreversible. This means that even if the login database is breached, the actual passwords are not exposed in plaintext. Proper hashing techniques, combined with salting, significantly enhance the security of stored passwords, reducing the impact of a potential breach.
5.
MULTIPLE CHOICE QUESTION
1 min • 20 pts
Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?
Availability
Integrity
Confidentiality
Non-repudation
Answer explanation
The security concept that best describes this scenario is Confidentiality.
Confidentiality ensures that sensitive information is only accessible to those who are authorized to view it, based on their roles and need-to-know basis. This prevents unauthorized access to client files and protects sensitive data
6.
MULTIPLE CHOICE QUESTION
1 min • 20 pts
The Chief Information Security Officer (CISO) at a large company would like to gain an understanding on how the company's security policies compare to the requirements imposed by external regulators. Which of the following should the CISO use?
Internal Audit
Attestation
Penetration Test
External Examination
Answer explanation
The CISO should use Attestation.
Attestation involves obtaining a formal statement or certification from an external party, often an auditor, that the company’s security policies and controls meet the requirements imposed by external regulators. This process provides assurance that the organization is compliant with regulatory standards.
7.
MULTIPLE CHOICE QUESTION
1 min • 20 pts
A security analyst investigating a workstation that is suspected of outbound communication to a command-and-control server. During the investigation, the analyst discovered that logs on the endpoint were detailed. Which of the following logs would the analyst most likely look at next?
IPS
Firewall
ACL
Windows Security
Answer explanation
The analyst would most likely look at Firewall logs next.
Firewall logs provide detailed records of inbound and outbound network traffic. They can help the analyst identify if the workstation is communicating with known or suspected command-and-control servers, which is crucial for detecting and mitigating potential threats.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Information Technology (IT)
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development