Sorular 11-20

Quiz
•
Computers
•
Professional Development
•
Medium
Bny *
Used 2+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.11 Which of the following control types is focused primarily on reducing risk before an incident occurs?
(A). Preventive
(B). Deterrent
(C). Corrective
(D). Detective
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.12 An organization has developed an application that needs a patch to fix a critical vulnerability In which of the following environments should the patch be deployed LAST?
(A). Test
(B). Staging
(C). Development
(D). Production
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.13 Which of the following control Types would be BEST to use in an accounting department to reduce losses from fraudulent transactions?
(A). Recovery
(B). Deterrent
(C). Corrective
(D). Detective
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.14 Which of the following risk management strategies would an organization use to maintain a legacy system with known risks for operational purposes?
(A). Acceptance
(B). Transference
(C). Avoidance
(D). Mitigation
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.15 A social media company based in North America is looking to expand into new global markets and needs to maintain compliance with international standards With which of the following is the company's data protection officer MOST likely concerned''
(A). NIST Framework
(B). ISO 27001
(C). GDPR
(D). PCI-DSS
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.16 Several users have opened tickets with the help desk. The help desk has reassigned the tickets to a security analyst for further review The security analyst reviews the following metrics:
Which of the following is MOST likely the result of the security analyst's review?
(A). The ISP is dropping outbound connections
(B). The user of the Sales-PC fell for a phishing attack
(C). Corporate PCs have been turned into a botnet
(D). An on-path attack is taking place between PCs and the router
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.17 A security analyst wants to fingerprint a web server Which of the following tools will the security analyst MOST likely use to accomplish this task?
(A). nmap -p1-65S35 192.168.0.10
(B). dig 192.168.0.10
(C). curl --head http://192.168.0.10
(D). ping 192.168.0.10
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Sec Practice Quiz

Quiz
•
Professional Development
15 questions
ELT with Fivetran Quiz

Quiz
•
Professional Development
10 questions
Cybersecurity

Quiz
•
Professional Development
13 questions
Accessories @ Apple

Quiz
•
Professional Development
15 questions
Cyber Security Fundamentals

Quiz
•
Professional Development
8 questions
Windows Updates

Quiz
•
9th Grade - Professio...
15 questions
SEC+ Ch.6 Review Test

Quiz
•
Professional Development
10 questions
CYSA 21-30

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade