Sorular 11-20
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Medium
Bny *
Used 2+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.11 Which of the following control types is focused primarily on reducing risk before an incident occurs?
(A). Preventive
(B). Deterrent
(C). Corrective
(D). Detective
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.12 An organization has developed an application that needs a patch to fix a critical vulnerability In which of the following environments should the patch be deployed LAST?
(A). Test
(B). Staging
(C). Development
(D). Production
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.13 Which of the following control Types would be BEST to use in an accounting department to reduce losses from fraudulent transactions?
(A). Recovery
(B). Deterrent
(C). Corrective
(D). Detective
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.14 Which of the following risk management strategies would an organization use to maintain a legacy system with known risks for operational purposes?
(A). Acceptance
(B). Transference
(C). Avoidance
(D). Mitigation
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.15 A social media company based in North America is looking to expand into new global markets and needs to maintain compliance with international standards With which of the following is the company's data protection officer MOST likely concerned''
(A). NIST Framework
(B). ISO 27001
(C). GDPR
(D). PCI-DSS
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.16 Several users have opened tickets with the help desk. The help desk has reassigned the tickets to a security analyst for further review The security analyst reviews the following metrics:
Which of the following is MOST likely the result of the security analyst's review?
(A). The ISP is dropping outbound connections
(B). The user of the Sales-PC fell for a phishing attack
(C). Corporate PCs have been turned into a botnet
(D). An on-path attack is taking place between PCs and the router
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
NO.17 A security analyst wants to fingerprint a web server Which of the following tools will the security analyst MOST likely use to accomplish this task?
(A). nmap -p1-65S35 192.168.0.10
(B). dig 192.168.0.10
(C). curl --head http://192.168.0.10
(D). ping 192.168.0.10
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
10 questions
CORSO G_SUITE parte seconda
Quiz
•
Professional Development
11 questions
SENA
Quiz
•
University - Professi...
10 questions
How are you doing?
Quiz
•
Professional Development
10 questions
AWS ACF Módulo 1 - Visão geral dos conceitos de nuvem
Quiz
•
Professional Development
14 questions
Input, output and storage de
Quiz
•
8th Grade - Professio...
10 questions
Azure Cloud computing
Quiz
•
Professional Development
10 questions
Les médias
Quiz
•
Professional Development
13 questions
GRAND OPENING INTERNSHIP EXERCISE 2024
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
