
Security+ 014124721425
Authored by jeffrey rosario
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
56 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A security manager is implementing MFA and patch management. What option should most effectively describe the control type and category?
C. Detective
A. Physical
B. Managerial
E. Preventative
F. Technical
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What option is the most effectively way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?
Public key infrastructure
Open public ledger
Public key encryption
Key escrow
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What option is the most important element when defining effective security governance?
Discovering and documenting external considerations
Developing procedures for employee onboarding and offboarding
Assigning roles and responsibilities for owners, controllers, and custodians
Defining and monitoring change management procedures
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. What option social engineering techniques are being attempted?
A. Typosquatting
B. Phishing
C. Impersonation
D. Vishing
smishing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a security incident, the security operations team identified sustained network traffic from a malicious IP address: 10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization's network. What option fulfills this request?
access-list inbound deny ig source 0.0.0.0/0 destination 10.1.4.9/32
access-list inbound deny ig source 10.1.4.9/32 destination 0.0.0.0/0
access-list inbound permit ig source 10.1.4.9/32 destination 0.0.0.0/0
access-list inbound permit ig source 0.0.0.0/0 destination 10.1.4.9/32
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization is evaluating new regulatory requirements associated with the implementation of corrective controls on a group of interconnected financial systems. What of the following is the most likely reason for the new requirement?
To defend against insider threats altering banking details
To ensure that errors are not passed to other systems
To allow for business insurance to be purchased
To prevent unauthorized changes to financial data
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A systems administrator works for a local hospital and needs to ensure patient data is protected and secure. What option data classifications should be used to secure patient data?
Private
Critical
Sensitive
Public
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?