
Security+ 9.kisim

Quiz
•
Business
•
University
•
Hard
U S
FREE Resource
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.256 A secullly operations analyst is using the company's SIEM solufon to correlate alens. Which
of the following stages of the Inciden reapanse process is this an example af?
(A). Eradication
(B). Recowery
(C). identification
(D). Preparation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.257 A security analyst is designing the appropnate controls to limit unauthorized access to a
physical site The analyst has a directive to utilize the lowest possible budget Which of the following
would BEST meet the requirements?
(A). Preventive controls
(B). Compensating controls
(C). Deterrent controls
(D). Detective controls
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.258 Which of the following environments can be stood up in a short period of time, utilizes
either dummy data or actual data, and is used to demonstrate and model system capabilities and
functionality for a fixed, agreed-upon duration of time?
(A). PoC
(B). Production
(C). Test
(D). Development
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.260 A network engineer at a company with a web server is building a new web environment
with the following requirements:
* Only one web server at a time can service requests.
* If the primary web server fails, a failover needs to occur to ensure the secondary web server
becomes the primary.
Which of the following load-balancing options BEST fits the requirements?
(A). Cookie-based
(B). Active-passive
(C). Persistence
(D). Round robin
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.261 A company is required to continue using legacy software to support a critical service. Which
of the following BEST explains a risk of this practice?
(A). Default system configuration
(B). Unsecure protocols
(C). Lack of vendor support
(D). Weak encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.262 To reduce and limit software and infrastructure costs, the Chief Information Officer has
requested to move email services to the cloud. The cloud provider and the organization must have
security controls to protect sensitive dat a. Which of the following cloud services would BEST
accommodate the request?
(A). laas
(B). Paas
(C). Daas
(D). SaaS
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NO.263 A security proposal was set up to track requests for remote access by creating a baseline of
the users' common sign-in properties. When a baseline deviation is detected, an Iv1FA challenge will
be triggered. Which of the following should be configured in order to deploy the proposal?
(A). Context-aware authentication
(B). Simultaneous authentication of equals
(C). Extensive authentication protocol
(D). Agentless network access control
Create a free account and access millions of resources
Similar Resources on Wayground
25 questions
UNIT 2: WORK AND MOTIVATION

Quiz
•
University
23 questions
Unit 1 Review - Intro Entrepreneurship & Professionalism

Quiz
•
11th Grade - University
30 questions
Law of Contract

Quiz
•
12th Grade - University
23 questions
Management in business

Quiz
•
12th Grade - University
22 questions
Transport documents abbreviations

Quiz
•
10th Grade - Professi...
25 questions
PERNIAGAAN KERTAS1PERCUBAAN SET 1

Quiz
•
University - Professi...
31 questions
Basic Computer Skills-Northstar

Quiz
•
University
25 questions
FIN533 : CHAPTER 2 - FINANCIAL STATEMENTS AND BUDGETING

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade