Security 4

Security 4

University

50 Qs

quiz-placeholder

Similar activities

Tour Guiding

Tour Guiding

University

50 Qs

UNITED NATIONS

UNITED NATIONS

KG - University

45 Qs

Nhập môn chuyên ngành Kiểm Toán (GK)

Nhập môn chuyên ngành Kiểm Toán (GK)

University

47 Qs

Understanding Broadcasting Quiz

Understanding Broadcasting Quiz

University

50 Qs

Social studies FC session 1 March 13, 2022

Social studies FC session 1 March 13, 2022

University - Professional Development

52 Qs

CMB THEORY - ICT - Qaidh

CMB THEORY - ICT - Qaidh

7th Grade - University

51 Qs

Security 2

Security 2

University

50 Qs

Information and communications technology 51-100

Information and communications technology 51-100

University

50 Qs

Security 4

Security 4

Assessment

Quiz

Other

University

Easy

Created by

Joe Smith

Used 3+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is working on a project to deploy a load balancer in the company's cloud environment. Which of the following fundamental security requirements does this project fulfil?

Privacy

Integrity

Confidentiality

Availability

Answer explanation

Availability is the correct answer because deploying a load balancer enhances the availability of applications and services by distributing traffic, providing redundancy, and ensuring continued access to resources even in the event of server failures. This project directly supports the availability aspect of the security triad.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator is changing the password policy within an enterprise environment and wants this update implemented on all systems as quickly as possible. Which of the following operating system security measures will the administrator most likely use?

Deploying PowerShell scripts

Pushing GPO update

Enabling PAP

Updating EDR profiles

Answer explanation

​Group Policy Objects (GPOs) provides an infrastructure for centralized configuration management of the Windows operating system and applications that run on the operating system. GPOs are a collection of settings that define what a system will look like and how it will behave for a defined group of computers or users.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?

ARO

RTO

RPO

ALE

SLE

Answer explanation

ARO: Annual Rate of Occurrence

RTO: Recovery Time Objective

RPO: Recovery Point Objective

ALE: Annual Loss Expectancy

SLE: Single Loss Expectancy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?

Key stretching

Tokenization

Data masking

Salting

Answer explanation

Salting is the correct answer because it involves adding a random string to a password before hashing to strengthen security. This technique effectively prevents precomputed hash attacks, making it a critical component of modern password protection strategies.

Salting is correct. Read the difference between Salting and Key Stretching on : https://library.mosse-institute.com/articles/2023/07/key-stretching-and-saltingm.html It explains a lot.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician is deploying a new security camera. Which of the following should the technician do?

Configure the correct VLAN.

Perform a vulnerability scan.

Disable unnecessary ports.

Conduct a site survey.

Answer explanation

D. Conduct a site survey. Before deploying a new security camera, conducting a site survey is crucial. A site survey helps determine the optimal placement of the camera, assesses environmental factors, ensures there are no blind spots, and verifies that the camera will effectively cover the desired area. It also helps in planning for network connectivity, power supply, and other logistical considerations.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is experiencing a web services outage on the public network. The services are up and available but inaccessible. The network logs show a sudden increase in network traffic that is causing the outage. Which of the following attacks is the organization experiencing?

ARP poisoning

Brute force

Buffer overflow

DDoS

Answer explanation

DDoS is the correct answer because the sudden increase in network traffic leading to a web services outage is characteristic of a Distributed Denial of Service attack. This type of attack overwhelms the target's resources, making services inaccessible, even though they are still operational. DDoS attacks specifically aim to disrupt access by flooding the target with excessive traffic, matching the symptoms described in the scenario.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following threat actors is the most likely to be motivated by profit?

Hacktivist

Insider threat

Organized crime

Shadow IT

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?