Security 6

Security 6

Professional Development

50 Qs

quiz-placeholder

Similar activities

Security 10

Security 10

Professional Development

50 Qs

Test Your Knowledge_AS_New_EN

Test Your Knowledge_AS_New_EN

Professional Development

46 Qs

Phase 3 Wreck your Brain

Phase 3 Wreck your Brain

University - Professional Development

48 Qs

101-151

101-151

KG - Professional Development

50 Qs

Milestone 2 - Updated 6/20/25

Milestone 2 - Updated 6/20/25

Professional Development

50 Qs

Đề TM Testing Genius Part 1

Đề TM Testing Genius Part 1

Professional Development

50 Qs

Permit Test

Permit Test

Professional Development

46 Qs

Security 6

Security 6

Assessment

Quiz

Other

Professional Development

Easy

Created by

Joe Smith

Used 3+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hosting provider needs to prove that its security controls have been in place over the last six months and have sufficiently protected customer data. Which of the following would provide the best proof that the hosting provider has met the requirements?

NIST CSF

SOC 2 Type 2 report

CIS Top 20 compliance reports

Vulnerability report

Answer explanation


ViciousAkira

Highly Voted 8 months, 3 weeks ago

B. SOC 2 Type 2 report SOC 2 stands for System and Organization Controls 2. A SOC 2 Type 2 report provides an audit of the effectiveness of security controls over a period of time (typically 6-12 months), specifically focusing on the operating effectiveness of controls related to security, availability, processing integrity, confidentiality, and privacy. This report would demonstrate that the controls were not only in place but also effectively protecting customer data over the required period.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A city municipality lost its primary data center when a tornado hit the facility. Which of the following should the city staff use immediately after the disaster to handle essential public services?

BCP

Communication plan

DRP

IRP

Answer explanation

C. DRP Disaster recovery (DR) plans define the processes and procedures that an organization will take when a disaster occurs. Unlike a BC plan, a DR plan focuses on natural and human-made disasters that may destroy facilities or infrastructure, or otherwise prevent an organization from functioning normally. A DR plan focuses on restoration or continuation of services despite a disaster.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a preventive control?

Configuration auditing

Log correlation

Incident alerts

Segregation of duties

Answer explanation

Segregation of duties is going to PREVENT users from having the ability to potentially manipulate processes within the business by splitting duties amongst others. Somewhat of a "checks and balances" kind of system.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A systems administrator notices that a testing system is down. While investigating, the systems administrator finds that the servers are online and accessible from any device on the server network. The administrator reviews the following information from the monitoring system:

Which of the following is the most likely cause of the outage?

Denial of service

ARP poisoning

Jamming

Kerberoasting

Answer explanation

A Denial of Service. This is clearly indicative of DoS attack where the two Test hosts are being overwhelmed with excessive traffic received causing them to become unresponsive and crash.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security team has been alerted to a flood of incoming emails that have various subject lines and are addressed to multiple email inboxes. Each email contains a URL shortener link that is redirecting to a dead domain. Which of the following is the best step for the security team to take?

Create a blocklist for all subject lines.

Send the dead domain to a DNS sinkhole.

Quarantine all emails received and notify all employees.

Block the URL shortener domain in the web proxy.

Answer explanation

Block the URL shortener domain in the web proxy: Blocking the URL shortener domain in the web proxy is a good idea if you suspect that the malicious URLs lead to a harmful site, but in this case, the links are redirecting to a dead domain. The malicious domain itself is no longer active, so blocking the URL shortener might not address the immediate threat. Additionally, this step doesn't prevent other similar attacks with different shorteners or domains in the future.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator is working to secure company data on corporate laptops in case the laptops are stolen. Which of the following solutions should the administrator consider?

Disk encryption

Data loss prevention

Operating system hardening

Boot security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company needs to keep the fewest records possible, meet compliance needs, and ensure destruction of records that are no longer needed. Which of the following best describes the policy that meets these requirements?

Security policy

Classification policy

Retention policy

Access control policy

Answer explanation

C. Retention policy. Reasoning: Security policy: While a security policy is important for protecting sensitive information, it doesn't specifically address the retention and destruction of records. Classification policy: A classification policy helps categorize information based on its sensitivity and value, but it doesn't provide guidelines for how long records should be retained or when they should be destroyed. Retention policy: A retention policy establishes rules for how long different types of records should be kept and when they can be destroyed. This is exactly what the company needs to meet compliance requirements and minimize the number of records it needs to store. Access control policy: An access control policy governs who can access different types of information. While it's important for data protection, it doesn't directly address the retention and destruction of records. Therefore, a retention policy is the best option for the company to meet its requirements of keeping the fewest records possible, meeting compliance needs, and ensuring destruction of records that are no longer needed.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?