PRACTICE EXAM - 116 QUESTIONS

PRACTICE EXAM - 116 QUESTIONS

Assessment

Quiz

•

Information Technology (IT)

•

Professional Development

•

Easy

Created by

Alliyah Estrada

Used 130+ times

FREE Resource

Student preview

quiz-placeholder

116 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers a few of the links and discovers that the links do not correspond to links associated with the company. Which of the following attack vectors is most likely being used?

Social Engineering

Default Password

Business Email

Unsecured Network

Answer explanation

The attack vector most likely being used is Social Engineering.

This scenario suggests a phishing attempt, where an attacker is trying to deceive the new employee by sending a fake onboarding email with malicious links that do not correspond to legitimate company links.

2.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

A company is located to an area prone to hurricanes is developing a disaster recovery plan and looking at site considerations that allow the company to immediately continue operations. Which of the following is the best type of site for this company?

Warm

Tertiary

Hot

Cold

Answer explanation

The best type of site for this company is Hot.

A hot site is a fully operational, ready-to-go site with all the necessary hardware, software, and data backups. It allows a company to immediately continue operations with minimal downtime, which is crucial for a company in a hurricane-prone area.

4o

3.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

A bank setup a new server that contains customer's PII. Which of the following should the bank use to make sure the sensitive data is not modified?

Network access control

Full disk encryption

User behavior analytics

File Integrity Monitoring

Answer explanation

The bank should use File Integrity Monitoring.

File Integrity Monitoring (FIM) is designed to ensure that sensitive data, such as customers' Personally Identifiable Information (PII), is not modified without authorization. It continuously monitors and alerts on any changes to critical files, ensuring data integrity.

4.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

An organization wants to limit potential impact to its log-in database on the event of breach. Which of the following options is the security team most likely to recommend?

Hashing

Tokenization

Obfuscation

Segmentation

Answer explanation

The security team is most likely to recommend Hashing.

Hashing is a cryptographic technique that converts passwords into a fixed-size string of characters, which is irreversible. This means that even if the login database is breached, the actual passwords are not exposed in plaintext. Proper hashing techniques, combined with salting, significantly enhance the security of stored passwords, reducing the impact of a potential breach.

5.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?

Availability

Integrity

Confidentiality

Non-repudation

Answer explanation

The security concept that best describes this scenario is Confidentiality.

Confidentiality ensures that sensitive information is only accessible to those who are authorized to view it, based on their roles and need-to-know basis. This prevents unauthorized access to client files and protects sensitive data

6.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

The Chief Information Security Officer (CISO) at a large company would like to gain an understanding on how the company's security policies compare to the requirements imposed by external regulators. Which of the following should the CISO use?

Internal Audit

Attestation

Penetration Test

External Examination

Answer explanation

The CISO should use Attestation.

Attestation involves obtaining a formal statement or certification from an external party, often an auditor, that the company’s security policies and controls meet the requirements imposed by external regulators. This process provides assurance that the organization is compliant with regulatory standards.

7.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

A security analyst investigating a workstation that is suspected of outbound communication to a command-and-control server. During the investigation, the analyst discovered that logs on the endpoint were detailed. Which of the following logs would the analyst most likely look at next?

IPS

Firewall

ACL

Windows Security

Answer explanation

The analyst would most likely look at Firewall logs next.

Firewall logs provide detailed records of inbound and outbound network traffic. They can help the analyst identify if the workstation is communicating with known or suspected command-and-control servers, which is crucial for detecting and mitigating potential threats.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?