NO.601 Which of tre following would BEST identity and remediate a catatoss
event in an enterprise using third-pany, web-based services and file-sharing platanmns?
SiberAbluka 601-630
Quiz
•
Computers
•
Professional Development
•
Easy
siber abluka
Used 7+ times
FREE Resource
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.601 Which of tre following would BEST identity and remediate a catatoss
event in an enterprise using third-pany, web-based services and file-sharing platanmns?
(A). SIEM
(B). CASE
(C). UTM
(D). EDR
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.602 An engineer is setting up a VDI environment for a factory tocation, and the business wants to deploy a low-cost solution to enadle users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?
(A). Laptops
(B). Containers
(C). Thin clients
(D). Workstations
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.603 A security analyst is reviewing the following command-line output:
Which of the following Is the analyst observing?
(A). IGMP spoofing
(B). URL redirection
(C). MAG address cloning
(D). DNS poisoning
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.604 Which of the following should a data owner require all personnel to sign to legally protect intellectual property?
(A). An NDA
(B). An AUP
(C). An ISA
(D). An MOU
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.605 A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?
(A). IDS solution
(B). EDR solution
(C). HIPS software solution
(D). Network DLP solution
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.606 A security analyst must determine if either SSH or Telnet is being used to log in to servers. Which of the following should the analyst use?
(A). logger
(B). Metasploit
(C). tcpdump
(D). netstat
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.607 A routine audit of medical billing claims revealed that several claims were submitted
without the subscriber's knowledge. A review of the audit logs for the medical billing company's
system indicated a company employee downloaded customer records and adjusted the direct
deposit information to a personal bank account. Which of the following does this action describe?
(A). Insider threat
(B). Social engineering
(C). Third-party risk
(D). Data breach
24 questions
A+ - 17A - Managing Security Settings
Quiz
•
Professional Development
25 questions
Assesment Quiz
Quiz
•
Professional Development
25 questions
CompTIA Security+ Quiz
Quiz
•
Professional Development
24 questions
A+ - 16C - Configure SOHO Router Security
Quiz
•
Professional Development
21 questions
Internet Technologies(Quiz 3)
Quiz
•
Professional Development
22 questions
A+ - 16D - Summarize Security Measures
Quiz
•
Professional Development
21 questions
A+ - 19C - Explain Data Handling Best Practices
Quiz
•
Professional Development
24 questions
Enterprise Mobility + Security
Quiz
•
Professional Development
15 questions
Multiplication Facts
Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz
Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set
Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025
Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)
Quiz
•
9th - 12th Grade
15 questions
June Review Quiz
Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles
Quiz
•
8th Grade
25 questions
Triangle Inequalities
Quiz
•
10th - 12th Grade