Security+ SY0-701

Quiz
•
Computers
•
University
•
Easy
Eng Networks
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A security analyst is reviewing the following logs:
Which of the following attacks is most likely occurring?
Password spraying
Account forgery
Pass-the-hash
Brute-force
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?
Hardening
Employee monitoring
Configuration enforcement
Least privilege
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following enables the use of an input field to run commands that can view or manipulate data?
Cross-site scripting
Side loading
Buffer overflow
SQL injection
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?
Corrective
Preventive
Deterrent
Detective
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?
Changing the remote desktop port to a non-standard number
Setting up a VPN and placing the jump server inside the firewall
Using a proxy for web connections from the remote desktop server
Connecting the remote server to the domain and increasing the password length
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A systems administrator is working on a solution with the following requirements:
• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?
Zero Trust
AAA
Non-repudiation
CIA
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A retail company processes credit card payments and must comply with PCI DSS requirements. The IT team needs to secure sensitive cardholder data at rest.
Question:
Which of the following is the most appropriate solution?
Encrypt data using AES-256 and restrict access to authorized personnel.
Hash the cardholder data using MD5 for long-term storage.
Store cardholder data in plain text on a secure server.
Use SSL/TLS to transmit cardholder data securely.
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Primary Storage

Quiz
•
4th Grade - University
13 questions
1.2.2 - Secondary Storage

Quiz
•
KG - University
10 questions
Exploring Addressing Modes

Quiz
•
University
16 questions
SecOps Quiz

Quiz
•
University
10 questions
Introduction to database systems

Quiz
•
University
10 questions
Cloud Computing

Quiz
•
University - Professi...
10 questions
Cloud Computing

Quiz
•
University
20 questions
Computer Components Intro Quiz

Quiz
•
9th Grade - University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade