Search Header Logo

Security+ 014124721425

Authored by jeffrey rosario

Computers

12th Grade

Used 1+ times

Security+ 014124721425
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

56 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A security manager is implementing MFA and patch management. What option should most effectively describe the control type and category?

C. Detective

A. Physical

B. Managerial

E. Preventative

F. Technical

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What option is the most effectively way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

Public key infrastructure

Open public ledger

Public key encryption

Key escrow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What option is the most important element when defining effective security governance?

Discovering and documenting external considerations

Developing procedures for employee onboarding and offboarding

Assigning roles and responsibilities for owners, controllers, and custodians

Defining and monitoring change management procedures

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. What option social engineering techniques are being attempted?

A. Typosquatting

B. Phishing

C. Impersonation

D. Vishing

smishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a security incident, the security operations team identified sustained network traffic from a malicious IP address: 10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization's network. What option fulfills this request?

access-list inbound deny ig source 0.0.0.0/0 destination 10.1.4.9/32

access-list inbound deny ig source 10.1.4.9/32 destination 0.0.0.0/0

access-list inbound permit ig source 10.1.4.9/32 destination 0.0.0.0/0

access-list inbound permit ig source 0.0.0.0/0 destination 10.1.4.9/32

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is evaluating new regulatory requirements associated with the implementation of corrective controls on a group of interconnected financial systems. What of the following is the most likely reason for the new requirement?

To defend against insider threats altering banking details

To ensure that errors are not passed to other systems

To allow for business insurance to be purchased

To prevent unauthorized changes to financial data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator works for a local hospital and needs to ensure patient data is protected and secure. What option data classifications should be used to secure patient data?

Private

Critical

Sensitive

Public

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?