
Security 7

Quiz
•
Other
•
University
•
Easy
Joe Smith
Used 5+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A systems administrator deployed a monitoring solution that does not require installation on the endpoints that the solution is monitoring. Which of the following is described in this scenario?
Agentless solution
Client-based soon
Open port
File-based solution
Answer explanation
Agentless monitoring does not require the installation of software on the target device. It uses standard protocols to collect information, making it less intrusive and less resource intensive.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst is reviewing the source code of an application in order to identify misconfigurations and vulnerabilities. Which of the following kinds of analysis best describes this review?
Dynamic
Static
Gap
Impact
Answer explanation
Static analysis refers to reviewing the source code of an application without executing it, in order to identify misconfigurations, vulnerabilities, and potential security flaws. This is the type of analysis the security analyst is performing by examining the code directly. Dynamic analysis (A) involves analyzing the application while it is running, to detect vulnerabilities that only appear during execution. Gap analysis (C) identifies discrepancies between current security measures and desired standards, but is not focused on source code review. Impact analysis (D) assesses the potential consequences of identified vulnerabilities but is not the process of reviewing source code directly.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following agreement types is used to limit external discussions?
BPA
NDA
SLA
MSA
Answer explanation
A. BPA: Business Process Automation
B. NDA: Non-Disclosure Agreement
C. SLA: Service Level Agreement
D. MSA: Master Service Agreement
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst is evaluating a SaaS application that the human resources department would like to implement. The analyst requests a SOC 2 report from the SaaS vendor. Which of the following processes is the analyst most likely conducting?
Internal audit
Penetration testing
Attestation
Due diligence
Answer explanation
D. Due diligence In this context, due diligence refers to the process of evaluating the security, compliance, and risk associated with a third-party vendor or service, such as a SaaS application. Requesting a SOC 2 report is a common part of the due diligence process to assess the vendor's controls related to security, availability, processing integrity, confidentiality, and privacy. Internal audit (A) refers to an organization's internal review of its own processes, not an external vendor. Penetration testing (B) involves actively testing for vulnerabilities by simulating attacks, which is not applicable here. Attestation (C) refers to a third-party audit or certification, such as the SOC 2 report itself, but the analyst is conducting due diligence by requesting the report.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is used to conceal credit card information in a database log file?
Tokenization
Masking
Hashing
Obfuscation
Answer explanation
B. Masking Masking is used to conceal sensitive information, such as credit card numbers, by replacing or hiding parts of the data. In the context of database log files, masking ensures that sensitive information is not exposed while maintaining the usability of the data for other purposes. Tokenization (A) replaces sensitive data with a token that can only be mapped back to the original data using a secure system, but it is not typically used for log file entries. Hashing (C) converts data into a fixed-length hash, but it's a one-way function, making it unsuitable if the original data needs to be retrieved. Obfuscation (D) refers to making data less understandable but is less structured and secure than masking for specific data like credit card numbers.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization recently started hosting a new service that customers access through a web portal. A security engineer needs to add to the existing security devices a new solution to protect this new service. Which of the following is the engineer most likely to deploy?
Layer 4 firewall
NGFW
WAF
UTM
Answer explanation
C. WAF (Web Application Firewall) A Web Application Firewall (WAF) is specifically designed to protect web applications by filtering, monitoring, and blocking HTTP/S traffic to and from a web service. Since the organization is hosting a new service through a web portal, a WAF would be the most appropriate solution to protect against common web-based attacks like SQL injection, cross-site scripting (XSS), and other OWASP Top 10 threats. Layer 4 firewall (A) provides protection at the transport layer, which is too low-level to specifically protect web applications. NGFW (Next-Generation Firewall) (B) adds application-level filtering and protection, but is generally broader in scope, not specifically tailored to web applications. UTM (Unified Threat Management) (D) is a multi-functional security device but doesn't provide the specialized web application protection that a WAF offers. Thus, WAF is the most suitable solution for protecting a web service accessed via a portal.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following topics would most likely be included within an organization's SDLC?
Service-level agreements
Information security policy
Penetration testing methodology
Branch protection requirements
Answer explanation
D. Branch protection requirements Branch protection requirements are related to the version control and development process within the SDLC, ensuring that code changes are reviewed, tested, and approved before being merged into main branches. This helps maintain code quality and security throughout the development process. Penetration testing is usually conducted as part of the testing phase or after deployment to identify vulnerabilities and security weaknesses. It is a separate process from the core stages of the SDLC but is an important aspect of ensuring the security and robustness of the application once development is completed.
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
SA405 - IT4A PRELIM EXAM

Quiz
•
University
50 questions
TLE 7-ICT

Quiz
•
7th Grade - University
50 questions
Security 4

Quiz
•
University
45 questions
Vowel Features

Quiz
•
University
49 questions
Educational Psychology Final

Quiz
•
University
49 questions
Factors of Production Review for Final Test Version #1

Quiz
•
11th Grade - University
51 questions
Tourism Promotion Services Quiz

Quiz
•
12th Grade - University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Appointment Passes Review

Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
Grammar Review

Quiz
•
6th - 9th Grade
Discover more resources for Other
15 questions
Disney Trivia

Quiz
•
University
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
7 questions
What Is Narrative Writing?

Interactive video
•
4th Grade - University
20 questions
Disney Trivia

Quiz
•
University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
5 questions
Examining Theme

Interactive video
•
4th Grade - University
23 questions
Lab 4: Quizziz Questions

Quiz
•
University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University