Security Plus CompTIA

Quiz
•
Computers
•
University - Professional Development
•
Hard
Thomas Martinez
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of the following access control schemes would be BEST for the company to implement?
Discretionary
Rule-based
Role-based
Mandatory
2.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?
Install a NIDS device at the boundary.
Segment the network with firewalls.
Update all antivirus signatures daily.
Implement application blacklisting.
3.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office. Priority must be given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?
Nmap
Heat Map
Network DIagrams
Wireshark
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?
Incident Response
COmmunications
Disaster Recovery
Data Retention
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy?
Mobile device management
Full-device encryption
Remote wipe
Biometrics
6.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?
Predictability
Key STretching
Salting
Hashing
7.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider. Which of the following risk management strategies is this an example of?
Acceptance
Mitigation
Avoidance
Transference
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

Quiz
•
University
15 questions
Software Engineering

Quiz
•
University
20 questions
Computer Security Measures

Quiz
•
11th Grade - University
20 questions
CompTIA Sec+

Quiz
•
University - Professi...
15 questions
First Quiz - CS326B

Quiz
•
University
18 questions
software engineering quiz

Quiz
•
KG - University
19 questions
INTRODUCTION TO ITIL

Quiz
•
Professional Development
22 questions
last22

Quiz
•
University
Popular Resources on Wayground
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
10 questions
"LAST STOP ON MARKET STREET" Vocabulary Quiz

Quiz
•
3rd Grade
19 questions
Fractions to Decimals and Decimals to Fractions

Quiz
•
6th Grade
16 questions
Logic and Venn Diagrams

Quiz
•
12th Grade
15 questions
Compare and Order Decimals

Quiz
•
4th - 5th Grade
20 questions
Simplifying Fractions

Quiz
•
6th Grade
20 questions
Multiplication facts 1-12

Quiz
•
2nd - 3rd Grade