Security+ SY0-701

Security+ SY0-701

University

15 Qs

quiz-placeholder

Similar activities

seguridad repaso

seguridad repaso

University

15 Qs

SEGURIDAD DE LA INFORMACION - UTEPSA

SEGURIDAD DE LA INFORMACION - UTEPSA

University

20 Qs

DATA LINK LAYER CONTROL

DATA LINK LAYER CONTROL

University

20 Qs

AACS3013 Quick Revision C1-C3

AACS3013 Quick Revision C1-C3

University

20 Qs

Ethical Hacking

Ethical Hacking

University

20 Qs

Introduction to Database

Introduction to Database

University

18 Qs

L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

University

17 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Security+ SY0-701

Security+ SY0-701

Assessment

Quiz

Computers

University

Easy

Created by

Eng Networks

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

A security analyst is reviewing the following logs:

Which of the following attacks is most likely occurring?


Password spraying

Account forgery

Pass-the-hash

Brute-force

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?

Hardening

Employee monitoring

Configuration enforcement

Least privilege

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following enables the use of an input field to run commands that can view or manipulate data?


Cross-site scripting

Side loading

Buffer overflow

SQL injection

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?


Corrective

Preventive

Deterrent

Detective

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

Changing the remote desktop port to a non-standard number

Setting up a VPN and placing the jump server inside the firewall

Using a proxy for web connections from the remote desktop server

Connecting the remote server to the domain and increasing the password length

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A systems administrator is working on a solution with the following requirements:
• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?

Zero Trust

AAA

Non-repudiation

CIA

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A retail company processes credit card payments and must comply with PCI DSS requirements. The IT team needs to secure sensitive cardholder data at rest.

Question:
Which of the following is the most appropriate solution?

Encrypt data using AES-256 and restrict access to authorized personnel.

Hash the cardholder data using MD5 for long-term storage.

Store cardholder data in plain text on a secure server.

Use SSL/TLS to transmit cardholder data securely.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?