
Warriors 151-180
Quiz
•
Computers
•
Professional Development
•
Medium
virtual world
Used 4+ times
FREE Resource
Enhance your content
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.151 Which of the following is a security best practice that ensures the integrity of aggregated log files within a SIEM?
(A). Set up hashing on the source log file servers that complies with local regulatory requirements,
(B). Back up the aggregated log files at least two times a day or as stated by local regulatory requirements.
(C). Write protect the aggregated log files and move them to an isolated server with limited access.
(D). Back up the source log files and archive them for at least six years or in accordance with local regulatory requirements.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.152 A company recently experienced an inside attack using a corporate machine that resulted in data compromise. Analysis indicated an unauthorized change to the software circumvented technological protection measures, The analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. Which of the following would provide the BEST solution?
(A). HIPS
(B). Flm
(C). TPM
(D). DLP
Answer explanation
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.153 A SOC operator is receiving continuous alerts from multiple Linux systems indicating that unsuccessful SSH attempts to a functional user ID have been attempted on each one of them in a short period of time. Which of the following BEST explains this behavior?
(A). Rainbow table attack
(B). Password spraying
(C). Logic bomb
(D). Malware bot
Answer explanation
Password Spraying is a variant of what is known as a brute force attack. In a traditional brute force attack, the perpetrator attempts to gain unauthorized access to a single account by guessing the password "repeatedly" in a very short period of time.
4.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
NO.154 A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst include in this documentation? (Select TWO).
(A). The order of volatility
(B). A CRC32 checksum
(C). The provenance of the artifacts
(E). The date timer
(D). The vendor's name(F). A warning banne
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.155 Which of the following can work as an authentication method and as an alerting mechanism for unauthorized access attempts?
(A). Smart card
(B). push notifications
(C). Attestation service
(D). HMAC-based, one-time password
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.156 A company is receiving emails with links to phishing sites that look very similar to the company's own website address and content. Which of the following is the BEST way for the company to mitigate this attack?
(A). Create a honeynet to trap attackers who access the VPN with credentials obtained by phishing.
(B). Generate a list of domains similar to the company's own and implement a DNS sinkhole for each.
(C). Disable POP and IMAP on all Internet-facing email servers and implement SMTPS.
(D). Use an automated tool to flood the phishing websites with fake usernames and passwords.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.157 Which of the following is a risk that is specifically associated with hosting applications in the public cloud?
(A). Unsecured root accounts
(B). Zero-day
(C). Shared tenancy
(D). Insider threat
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
25 questions
AO Tema 9. Cuestionario
Quiz
•
Professional Development
25 questions
IT support Level-1 (MS Excel)
Quiz
•
Professional Development
25 questions
Guess the Gibberish Word
Quiz
•
Professional Development
25 questions
Cultura digital II - Simulador de examen
Quiz
•
Professional Development
25 questions
CN-First Test
Quiz
•
Professional Development
25 questions
Ethereum Devcon Quiz - 1
Quiz
•
Professional Development
25 questions
Quiz de Lógica de Programação 2
Quiz
•
Professional Development
25 questions
AJWT MCQ Quiz
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
11 questions
NEASC Extended Advisory
Lesson
•
9th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade