
Security+ 014825401623
Authored by jeffrey rosario
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following can be used to compromise a system that is running an RTOS?
Cross-site scripting
Memory injection
Replay attack
Ransomware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned, one of the batch jobs failed and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?
Job rotation
Retention
Outsourcing
Separation of duties
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst has determined that a security breach would have a financial impact of $15,000 and is expected to occur twice within a three-year period. Which of the following is the ALE for this risk?
$7,500
$10,000
$15,000
$30,000
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A service provider wants a cost-effective way to rapidly expand from providing internet links to managing them. Which of the following methods will allow the service provider to best scale its services while maintaining performance consistency?
Escalation support
Increased workforce
Baseline enforcement
Technical debt
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following should a company use to provide proof of external network security testing?
Business impact analysis
Supply chain analysis
Vulnerability assessment
Third-party attestation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A database administrator is updating the company's SQL database, which stores credit card information for pending purchases. Which of the following is the best method to secure the data against a potential breach?
A. Tokenization
B. Masking
C. Obfuscation
D. Hashing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A certificate authority needs to post information about expired certificates. Which of the following would accomplish this task?
TPM
CRL
PKI
CSR
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?