Security+ SY0-701

Security+ SY0-701

University

15 Qs

quiz-placeholder

Similar activities

Multimedia Video & Animation

Multimedia Video & Animation

University

20 Qs

Django-quiz

Django-quiz

5th Grade - University

20 Qs

DreamWeaver CS6

DreamWeaver CS6

University

20 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

1-基本数据类型

1-基本数据类型

University

10 Qs

Banco de Dados

Banco de Dados

University - Professional Development

20 Qs

Komponen Jaringan & Pengkabelan

Komponen Jaringan & Pengkabelan

University

15 Qs

Security+ SY0-701

Security+ SY0-701

Assessment

Quiz

Computers

University

Easy

Created by

Eng Networks

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

A security analyst is reviewing the following logs:

Which of the following attacks is most likely occurring?


Password spraying

Account forgery

Pass-the-hash

Brute-force

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?

Hardening

Employee monitoring

Configuration enforcement

Least privilege

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following enables the use of an input field to run commands that can view or manipulate data?


Cross-site scripting

Side loading

Buffer overflow

SQL injection

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?


Corrective

Preventive

Deterrent

Detective

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

Changing the remote desktop port to a non-standard number

Setting up a VPN and placing the jump server inside the firewall

Using a proxy for web connections from the remote desktop server

Connecting the remote server to the domain and increasing the password length

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A systems administrator is working on a solution with the following requirements:
• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?

Zero Trust

AAA

Non-repudiation

CIA

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A retail company processes credit card payments and must comply with PCI DSS requirements. The IT team needs to secure sensitive cardholder data at rest.

Question:
Which of the following is the most appropriate solution?

Encrypt data using AES-256 and restrict access to authorized personnel.

Hash the cardholder data using MD5 for long-term storage.

Store cardholder data in plain text on a secure server.

Use SSL/TLS to transmit cardholder data securely.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?