A security analyst is reviewing the following logs:
Which of the following attacks is most likely occurring?
Security+ SY0-701
Quiz
•
Computers
•
University
•
Easy
Eng Networks
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A security analyst is reviewing the following logs:
Which of the following attacks is most likely occurring?
Password spraying
Account forgery
Pass-the-hash
Brute-force
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?
Hardening
Employee monitoring
Configuration enforcement
Least privilege
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following enables the use of an input field to run commands that can view or manipulate data?
Cross-site scripting
Side loading
Buffer overflow
SQL injection
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?
Corrective
Preventive
Deterrent
Detective
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?
Changing the remote desktop port to a non-standard number
Setting up a VPN and placing the jump server inside the firewall
Using a proxy for web connections from the remote desktop server
Connecting the remote server to the domain and increasing the password length
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A systems administrator is working on a solution with the following requirements:
• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?
Zero Trust
AAA
Non-repudiation
CIA
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A retail company processes credit card payments and must comply with PCI DSS requirements. The IT team needs to secure sensitive cardholder data at rest.
Question:
Which of the following is the most appropriate solution?
Encrypt data using AES-256 and restrict access to authorized personnel.
Hash the cardholder data using MD5 for long-term storage.
Store cardholder data in plain text on a secure server.
Use SSL/TLS to transmit cardholder data securely.
20 questions
Threats, Issues, and Defenses - Ch 5
Quiz
•
10th Grade - University
10 questions
Primary Storage
Quiz
•
4th Grade - University
15 questions
Introduction to windows server 2016
Quiz
•
University
14 questions
Network Fundamentals-Physical layer
Quiz
•
9th Grade - Professio...
20 questions
SEGURIDAD DE LA INFORMACION - UTEPSA
Quiz
•
University
20 questions
DATA LINK LAYER CONTROL
Quiz
•
University
20 questions
AACS3013 Quick Revision C1-C3
Quiz
•
University
20 questions
Database
Quiz
•
12th Grade - University
15 questions
Character Analysis
Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
10 questions
American Flag
Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25
Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers
Quiz
•
6th - 8th Grade