An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO).
Sec+ Quiz - 1

Quiz
•
Computers
•
Professional Development
•
Medium
Isabella S
Used 34+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 2 pts
The hashing method
The encryption method
The registration authority
The certificate authority
The back-end directory source
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL. https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?
On-path
Domain hijacking
DNS poisoning
Evil twin
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A systems administrator is troubleshooting a server's connection to an internal web server. The administrator needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?
Netstat
Ping
ssh
Ipconfig
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The Chief Information Security Officer (CISO) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?
Lessons learned
Preparation
Detection
Containment
Root cause analysis
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security analyst was called to investigate a file received directly from a hardware manufacturer. The analyst is trying to determine whether it is modified in transit before installation on the user's computer. Which of the following can be used to safely assess the file?
Check the hash of the installation file
Match the file names
Verify the URL download location
Verify the code-signing certificate
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An employee received a word processing file that was delivered as an email attachment. The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?
Embedded Python code
Macro-enabled file
Bash scripting
Credential-harvesting website
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A security forensics analyst is examining a virtual server. The analyst wants to preserve the present state of the virtual server, including memory contents. Which of the following backup types should be used?
Snapshot
Differential
Cloud
Full
Incremental
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Sec+ Quiz - 3

Quiz
•
Professional Development
17 questions
220-1101 Chapter 1

Quiz
•
Professional Development
15 questions
CloudBinary_Apache_Tomcat_Quiz- 2

Quiz
•
Professional Development
20 questions
AWS-Basics

Quiz
•
Professional Development
20 questions
QUIZZERIA (Round 1)

Quiz
•
Professional Development
11 questions
Linux Essentials Quiz 2

Quiz
•
Professional Development
20 questions
101-120

Quiz
•
Professional Development
10 questions
Cloud Computing

Quiz
•
University - Professi...
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade