Security 8

Security 8

Professional Development

50 Qs

quiz-placeholder

Similar activities

Salesforce Admin Certification - SP21 - Set # 1

Salesforce Admin Certification - SP21 - Set # 1

Professional Development

47 Qs

Simulare examen final

Simulare examen final

Professional Development

50 Qs

AZ-900 Practice Test 6

AZ-900 Practice Test 6

Professional Development

51 Qs

Fun@Work-1

Fun@Work-1

Professional Development

46 Qs

LIB Test G

LIB Test G

Professional Development

50 Qs

YES EXAM REVIEWER - VUL

YES EXAM REVIEWER - VUL

Professional Development

51 Qs

MGNF Quiz - 64

MGNF Quiz - 64

Professional Development

55 Qs

MAB

MAB

Professional Development

49 Qs

Security 8

Security 8

Assessment

Quiz

Other

Professional Development

Hard

Created by

Joe Smith

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following consequences would a retail chain most likely face from customers in the event the retailer is non-compliant with PCI DSS?

Contractual impacts

Sanctions

Fines

Reputational damage

Answer explanation

The question says, 'from customers' who won't enforce the other options.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is reviewing logs and discovers the following:

149.32.228.10 -- [28/Jan/2023:16:32:45 -0900] "GET / HTTP/1.0"

User-Agent: ${/bin/sh/ id} 200 397

Which of the following should be used to best mitigate this type of attack?

Input sanitization

Secure cookies

Static code analysis

Sandboxing

Answer explanation

The log entry in the image suggests that the system is potentially under attack, as the User-Agent header contains what looks like a shell command: ${/bin/sh/id}. This type of activity may indicate an attempted command injection attack, where an attacker is trying to execute shell commands via a vulnerable web application.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An administrator is installing an SSL certificate on a new system. During testing, errors indicate that the certificate is not trusted. The administrator has verified with the issuing CA and has validated the private key. Which of the following should the administrator check for next?

If the wildcard certificate is configured

If the certificate signing request is valid

If the root certificate is installed

If the public key is configured

Answer explanation

For an SSL/TLS certificate to be trusted, the system must have the root certificate (and any intermediate certificates) from the issuing Certificate Authority (CA) installed in its trusted certificate store. If the root or intermediate certificate is missing, the system will not recognize the SSL certificate as valid, leading to trust errors during testing.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee emailed a new systems administrator a malicious web link and convinced the administrator to change the email server’s password. The employee used this access to remove the mailboxes of key personnel. Which of the following security awareness concepts would help prevent this threat in the future?

Recognizing phishing

Providing situational awareness training

Using password management

Reviewing email policies

Answer explanation

This scenario describes a phishing attack, where the employee tricked the systems administrator into performing an action (changing the email server's password) by sending a malicious web link. Security awareness training that focuses on recognizing phishing attempts can help employees and administrators identify and avoid such manipulative tactics in the future. Training should include spotting suspicious links, verifying requests, and understanding social engineering techniques.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following strategies should an organization use to efficiently manage and analyze multiple types of logs?

Deploy a SIEM solution

Create custom scripts to aggregate and analyze logs.

Implement EDR technology.

Install a unified threat management appliance.

Answer explanation

A. Deploy a SIEM solution Explanation: SIEM (Security Information and Event Management) solutions are designed specifically to collect, aggregate, and analyze large volumes of logs from different sources (e.g., network devices, servers, endpoints, security systems).

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A new security regulation was announced that will take effect in the coming year. A company must comply with it to remain in business. Which of the following activities should the company perform next?

Gap analysis

Policy review

Security procedure evaluation

Threat scope reduction

Answer explanation

Gap Analysis in Security: Compares what you have (existing security) vs what you need (required security) Shows what's missing Creates plan to fill the gaps Helps meet new security requirements efficiently Like a security checklist that shows:

Have ✓

Need ✗

Plan to get there →

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An accountant is transferring information to a bank over FTP. Which of the following mitigations should the accountant use to protect the confidentiality of the data?

Tokenization

Data masking

Encryption

Obfuscation

Answer explanation

C. Encryption Explanation: When transferring sensitive data over FTP (File Transfer Protocol), encryption is the best method to ensure the confidentiality of the data. FTP by itself does not provide any encryption, meaning that the data is transmitted in plain text, which can be intercepted by attackers.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?