Questões (81-90)

Questões (81-90)

Professional Development

10 Qs

quiz-placeholder

Similar activities

rubiks cube quiz

rubiks cube quiz

KG - Professional Development

13 Qs

Food Safety

Food Safety

University - Professional Development

10 Qs

Unidad 3. Habilidades comunicativas

Unidad 3. Habilidades comunicativas

Professional Development

10 Qs

ECG

ECG

University - Professional Development

12 Qs

clash royale

clash royale

Professional Development

14 Qs

preguntas cedipro 2

preguntas cedipro 2

10th Grade - Professional Development

10 Qs

Purification & Types of water

Purification & Types of water

1st Grade - Professional Development

15 Qs

Nom035- Liderazgo

Nom035- Liderazgo

Professional Development

10 Qs

Questões (81-90)

Questões (81-90)

Assessment

Quiz

Other

Professional Development

Practice Problem

Easy

Created by

Rogi Bard

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

An administrator is reviewing a single server's security logs and discovers the following: Which of the following best describes the action captured in this log file?

A. Brute-force attack
B. Privilege escalation
C. Failed password audit
D. Forgotten password by the user

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A security engineer is implementing FDE for all laptops in an organization. Which of the following are the most important for the engineer to consider as part of the planning process? (Choose two.)

A. Key escrow
B. TPM presence
C. Digital signatures
D. Data tokenization
E. Public key management

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

A. Changing the remote desktop port to a non-standard number
B. Setting up a VPN and placing the jump server inside the firewall
C. Using a proxy for web connections from the remote desktop server
D. Connecting the remote server to the domain and increasing the password length

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks?

A. ACL
B. DLP
C. IDS
D. IPS

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?

A. Remote access points should fail closed.
B. Logging controls should fail open.
C. Safety controls should fail open.
D. Logical security controls should fail closed.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would be best suited for constantly changing environments?

A. RTOS
B. Containers
C. Embedded systems
D. SCADA

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following incident response activities ensures evidence is properly handled?

A. E-discovery
B. Chain of custody
C. Legal hold
D. Preservation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?