Search Header Logo

Security+ 9.kisim

Authored by U S

Business

University

Security+ 9.kisim
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.256 A secullly operations analyst is using the company's SIEM solufon to correlate alens. Which

of the following stages of the Inciden reapanse process is this an example af?

(A). Eradication

(B). Recowery

(C). identification

(D). Preparation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.257 A security analyst is designing the appropnate controls to limit unauthorized access to a

physical site The analyst has a directive to utilize the lowest possible budget Which of the following

would BEST meet the requirements?

(A). Preventive controls

(B). Compensating controls

(C). Deterrent controls

(D). Detective controls

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.258 Which of the following environments can be stood up in a short period of time, utilizes

either dummy data or actual data, and is used to demonstrate and model system capabilities and

functionality for a fixed, agreed-upon duration of time?

(A). PoC

(B). Production

(C). Test

(D). Development

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.260 A network engineer at a company with a web server is building a new web environment

with the following requirements:

* Only one web server at a time can service requests.

* If the primary web server fails, a failover needs to occur to ensure the secondary web server

becomes the primary.

Which of the following load-balancing options BEST fits the requirements?

(A). Cookie-based

(B). Active-passive

(C). Persistence

(D). Round robin

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.261 A company is required to continue using legacy software to support a critical service. Which

of the following BEST explains a risk of this practice?

(A). Default system configuration

(B). Unsecure protocols

(C). Lack of vendor support

(D). Weak encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.262 To reduce and limit software and infrastructure costs, the Chief Information Officer has

requested to move email services to the cloud. The cloud provider and the organization must have

security controls to protect sensitive dat a. Which of the following cloud services would BEST

accommodate the request?

(A). laas

(B). Paas

(C). Daas

(D). SaaS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.263 A security proposal was set up to track requests for remote access by creating a baseline of

the users' common sign-in properties. When a baseline deviation is detected, an Iv1FA challenge will

be triggered. Which of the following should be configured in order to deploy the proposal?

(A). Context-aware authentication

(B). Simultaneous authentication of equals

(C). Extensive authentication protocol

(D). Agentless network access control

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?