SiberAbluka 601-630

SiberAbluka 601-630

Professional Development

26 Qs

quiz-placeholder

Similar activities

Piggy Quiz kinda hard

Piggy Quiz kinda hard

3rd Grade - Professional Development

21 Qs

IT Quiz oCRM

IT Quiz oCRM

Professional Development

21 Qs

Business Intelligence

Business Intelligence

Professional Development

21 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

21 Qs

minecraft

minecraft

KG - Professional Development

24 Qs

MTCNA Pretest 2

MTCNA Pretest 2

Professional Development

22 Qs

Personas en la tecnología e informática

Personas en la tecnología e informática

6th Grade - Professional Development

22 Qs

Smart Draw 14

Smart Draw 14

Professional Development

21 Qs

SiberAbluka 601-630

SiberAbluka 601-630

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

siber abluka

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.601 Which of tre following would BEST identity and remediate a catatoss

event in an enterprise using third-pany, web-based services and file-sharing platanmns?

(A). SIEM

(B). CASE

(C). UTM

(D). EDR

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.602 An engineer is setting up a VDI environment for a factory tocation, and the business wants to deploy a low-cost solution to enadle users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?

(A). Laptops

(B). Containers

(C). Thin clients

(D). Workstations

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

NO.603 A security analyst is reviewing the following command-line output:

Which of the following Is the analyst observing?

(A). IGMP spoofing

(B). URL redirection

(C). MAG address cloning

(D). DNS poisoning

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.604 Which of the following should a data owner require all personnel to sign to legally protect intellectual property?

(A). An NDA

(B). An AUP

(C). An ISA

(D). An MOU

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.605 A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?

(A). IDS solution

(B). EDR solution

(C). HIPS software solution

(D). Network DLP solution

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.606 A security analyst must determine if either SSH or Telnet is being used to log in to servers. Which of the following should the analyst use?

(A). logger

(B). Metasploit

(C). tcpdump

(D). netstat

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.607 A routine audit of medical billing claims revealed that several claims were submitted

without the subscriber's knowledge. A review of the audit logs for the medical billing company's

system indicated a company employee downloaded customer records and adjusted the direct

deposit information to a personal bank account. Which of the following does this action describe?

(A). Insider threat

(B). Social engineering

(C). Third-party risk

(D). Data breach

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?