NO.11 Which of the following control types is focused primarily on reducing risk before an incident occurs?
Sorular 11-20

Quiz
•
Computers
•
Professional Development
•
Medium
Bny *
Used 2+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
(A). Preventive
(B). Deterrent
(C). Corrective
(D). Detective
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.12 An organization has developed an application that needs a patch to fix a critical vulnerability In which of the following environments should the patch be deployed LAST?
(A). Test
(B). Staging
(C). Development
(D). Production
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.13 Which of the following control Types would be BEST to use in an accounting department to reduce losses from fraudulent transactions?
(A). Recovery
(B). Deterrent
(C). Corrective
(D). Detective
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.14 Which of the following risk management strategies would an organization use to maintain a legacy system with known risks for operational purposes?
(A). Acceptance
(B). Transference
(C). Avoidance
(D). Mitigation
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.15 A social media company based in North America is looking to expand into new global markets and needs to maintain compliance with international standards With which of the following is the company's data protection officer MOST likely concerned''
(A). NIST Framework
(B). ISO 27001
(C). GDPR
(D). PCI-DSS
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.16 Several users have opened tickets with the help desk. The help desk has reassigned the tickets to a security analyst for further review The security analyst reviews the following metrics:
Which of the following is MOST likely the result of the security analyst's review?
(A). The ISP is dropping outbound connections
(B). The user of the Sales-PC fell for a phishing attack
(C). Corporate PCs have been turned into a botnet
(D). An on-path attack is taking place between PCs and the router
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.17 A security analyst wants to fingerprint a web server Which of the following tools will the security analyst MOST likely use to accomplish this task?
(A). nmap -p1-65S35 192.168.0.10
(B). dig 192.168.0.10
(C). curl --head http://192.168.0.10
(D). ping 192.168.0.10
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Security+ 701 - Quiz 2

Quiz
•
Professional Development
14 questions
Linux Command Line Quiz

Quiz
•
Professional Development
15 questions
Sec+ Quiz - 1

Quiz
•
Professional Development
15 questions
Sec Practice Quiz

Quiz
•
Professional Development
15 questions
SEC+ Ch.11 Review Test

Quiz
•
Professional Development
10 questions
How are you doing?

Quiz
•
Professional Development
10 questions
Quiz 3 Windows Server

Quiz
•
Professional Development
12 questions
Cloud QUIZ

Quiz
•
University - Professi...
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade