Search Header Logo

Security+ 014825401623

Authored by jeffrey rosario

Computers

12th Grade

Used 2+ times

Security+ 014825401623
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be used to compromise a system that is running an RTOS?

Cross-site scripting

Memory injection

Replay attack

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned, one of the batch jobs failed and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?

Job rotation

Retention

Outsourcing

Separation of duties

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst has determined that a security breach would have a financial impact of $15,000 and is expected to occur twice within a three-year period. Which of the following is the ALE for this risk?

$7,500

$10,000

$15,000

$30,000

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A service provider wants a cost-effective way to rapidly expand from providing internet links to managing them. Which of the following methods will allow the service provider to best scale its services while maintaining performance consistency?

Escalation support

Increased workforce

Baseline enforcement

Technical debt

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should a company use to provide proof of external network security testing?

Business impact analysis

Supply chain analysis

Vulnerability assessment

Third-party attestation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A database administrator is updating the company's SQL database, which stores credit card information for pending purchases. Which of the following is the best method to secure the data against a potential breach?

A. Tokenization

B. Masking

C. Obfuscation

D. Hashing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A certificate authority needs to post information about expired certificates. Which of the following would accomplish this task?

TPM

CRL

PKI

CSR

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?