SiberAbluka 601-630

SiberAbluka 601-630

Professional Development

26 Qs

quiz-placeholder

Similar activities

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

21 Qs

LAHSA - Computer Science Principles B - Assessment #2

LAHSA - Computer Science Principles B - Assessment #2

10th Grade - Professional Development

23 Qs

BTEC Coding & Logic

BTEC Coding & Logic

12th Grade - Professional Development

24 Qs

CS Quiz Test 2

CS Quiz Test 2

Professional Development

25 Qs

1-30 Quiz

1-30 Quiz

Professional Development

30 Qs

IS404 - SY2023

IS404 - SY2023

Professional Development

21 Qs

Salesforce Daily Quiz

Salesforce Daily Quiz

Professional Development

24 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

SiberAbluka 601-630

SiberAbluka 601-630

Assessment

Quiz

Computers

Professional Development

Easy

Created by

siber abluka

Used 7+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.601 Which of tre following would BEST identity and remediate a catatoss

event in an enterprise using third-pany, web-based services and file-sharing platanmns?

(A). SIEM

(B). CASE

(C). UTM

(D). EDR

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.602 An engineer is setting up a VDI environment for a factory tocation, and the business wants to deploy a low-cost solution to enadle users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?

(A). Laptops

(B). Containers

(C). Thin clients

(D). Workstations

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

NO.603 A security analyst is reviewing the following command-line output:

Which of the following Is the analyst observing?

(A). IGMP spoofing

(B). URL redirection

(C). MAG address cloning

(D). DNS poisoning

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.604 Which of the following should a data owner require all personnel to sign to legally protect intellectual property?

(A). An NDA

(B). An AUP

(C). An ISA

(D). An MOU

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.605 A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?

(A). IDS solution

(B). EDR solution

(C). HIPS software solution

(D). Network DLP solution

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.606 A security analyst must determine if either SSH or Telnet is being used to log in to servers. Which of the following should the analyst use?

(A). logger

(B). Metasploit

(C). tcpdump

(D). netstat

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.607 A routine audit of medical billing claims revealed that several claims were submitted

without the subscriber's knowledge. A review of the audit logs for the medical billing company's

system indicated a company employee downloaded customer records and adjusted the direct

deposit information to a personal bank account. Which of the following does this action describe?

(A). Insider threat

(B). Social engineering

(C). Third-party risk

(D). Data breach

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?