Warriors 151-180

Warriors 151-180

Professional Development

30 Qs

quiz-placeholder

Similar activities

1.4 and 1.5

1.4 and 1.5

1st Grade - Professional Development

25 Qs

Компьютерные методы и решения технических задач

Компьютерные методы и решения технических задач

Professional Development

25 Qs

LIST-TUPLES-SET-DICTIONARY

LIST-TUPLES-SET-DICTIONARY

Professional Development

25 Qs

KD 26-MYOB

KD 26-MYOB

Professional Development

25 Qs

PLD_FinalsSAT Quiz

PLD_FinalsSAT Quiz

Professional Development

25 Qs

ASESMENT INFORMATIKA BAB 1

ASESMENT INFORMATIKA BAB 1

5th Grade - Professional Development

25 Qs

DATASTRUCTURES-3SEM

DATASTRUCTURES-3SEM

Professional Development

25 Qs

UD1. Características de los lenguajes de marcas

UD1. Características de los lenguajes de marcas

Professional Development

26 Qs

Warriors 151-180

Warriors 151-180

Assessment

Quiz

Computers

Professional Development

Medium

Created by

virtual world

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.151 Which of the following is a security best practice that ensures the integrity of aggregated log files within a SIEM?

(A). Set up hashing on the source log file servers that complies with local regulatory requirements,

(B). Back up the aggregated log files at least two times a day or as stated by local regulatory requirements.

(C). Write protect the aggregated log files and move them to an isolated server with limited access.

(D). Back up the source log files and archive them for at least six years or in accordance with local regulatory requirements.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.152 A company recently experienced an inside attack using a corporate machine that resulted in data compromise. Analysis indicated an unauthorized change to the software circumvented technological protection measures, The analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. Which of the following would provide the BEST solution?

(A). HIPS

(B). Flm

(C). TPM

(D). DLP

Answer explanation

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.153 A SOC operator is receiving continuous alerts from multiple Linux systems indicating that unsuccessful SSH attempts to a functional user ID have been attempted on each one of them in a short period of time. Which of the following BEST explains this behavior?

(A). Rainbow table attack

(B). Password spraying

(C). Logic bomb

(D). Malware bot

Answer explanation

Password Spraying is a variant of what is known as a brute force attack. In a traditional brute force attack, the perpetrator attempts to gain unauthorized access to a single account by guessing the password "repeatedly" in a very short period of time.

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

NO.154 A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst include in this documentation? (Select TWO).

(A). The order of volatility

(B). A CRC32 checksum

(C). The provenance of the artifacts

(E). The date timer

(D). The vendor's name(F). A warning banne

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.155 Which of the following can work as an authentication method and as an alerting mechanism for unauthorized access attempts?

(A). Smart card

(B). push notifications

(C). Attestation service

(D). HMAC-based, one-time password

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.156 A company is receiving emails with links to phishing sites that look very similar to the company's own website address and content. Which of the following is the BEST way for the company to mitigate this attack?

(A). Create a honeynet to trap attackers who access the VPN with credentials obtained by phishing.

(B). Generate a list of domains similar to the company's own and implement a DNS sinkhole for each.

(C). Disable POP and IMAP on all Internet-facing email servers and implement SMTPS.

(D). Use an automated tool to flood the phishing websites with fake usernames and passwords.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.157 Which of the following is a risk that is specifically associated with hosting applications in the public cloud?

(A). Unsecured root accounts

(B). Zero-day

(C). Shared tenancy

(D). Insider threat

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?