Security+ SY0-701

Security+ SY0-701

University

15 Qs

quiz-placeholder

Similar activities

Module 3-Creating Vlans

Module 3-Creating Vlans

9th Grade - University

12 Qs

Access Control Quiz

Access Control Quiz

University

15 Qs

Network Design

Network Design

University

10 Qs

005_AAA Cyber

005_AAA Cyber

12th Grade - University

20 Qs

Cisco 1, Module 16

Cisco 1, Module 16

University

15 Qs

Nmap Options, Host Discovery, and Port Scanning

Nmap Options, Host Discovery, and Port Scanning

6th Grade - University

16 Qs

UFCD 5111 - Servidores Linux

UFCD 5111 - Servidores Linux

University

20 Qs

RAM

RAM

University

10 Qs

Security+ SY0-701

Security+ SY0-701

Assessment

Quiz

Computers

University

Easy

Created by

Eng Networks

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

A security analyst is reviewing the following logs:

Which of the following attacks is most likely occurring?


Password spraying

Account forgery

Pass-the-hash

Brute-force

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?

Hardening

Employee monitoring

Configuration enforcement

Least privilege

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following enables the use of an input field to run commands that can view or manipulate data?


Cross-site scripting

Side loading

Buffer overflow

SQL injection

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?


Corrective

Preventive

Deterrent

Detective

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

Changing the remote desktop port to a non-standard number

Setting up a VPN and placing the jump server inside the firewall

Using a proxy for web connections from the remote desktop server

Connecting the remote server to the domain and increasing the password length

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A systems administrator is working on a solution with the following requirements:
• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?

Zero Trust

AAA

Non-repudiation

CIA

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A retail company processes credit card payments and must comply with PCI DSS requirements. The IT team needs to secure sensitive cardholder data at rest.

Question:
Which of the following is the most appropriate solution?

Encrypt data using AES-256 and restrict access to authorized personnel.

Hash the cardholder data using MD5 for long-term storage.

Store cardholder data in plain text on a secure server.

Use SSL/TLS to transmit cardholder data securely.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?