Security + quiz 13

Security + quiz 13

Professional Development

13 Qs

quiz-placeholder

Similar activities

AZ-400 | Mod-1 & 2

AZ-400 | Mod-1 & 2

Professional Development

13 Qs

Principles of Electronic Communication ; A review

Principles of Electronic Communication ; A review

Professional Development

10 Qs

ED810 M7 Review

ED810 M7 Review

University - Professional Development

15 Qs

Introduction to central heating

Introduction to central heating

Professional Development

16 Qs

BCS Network Security Test 2

BCS Network Security Test 2

University - Professional Development

18 Qs

Cyber Safe Session 1

Cyber Safe Session 1

Professional Development

10 Qs

Vocabulary: Places 1

Vocabulary: Places 1

University - Professional Development

12 Qs

Security + quiz 13

Security + quiz 13

Assessment

Quiz

Instructional Technology

Professional Development

Hard

Created by

Matt Hansen

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst needs to be proactive in understand the types of attacks that could potentially target the company's execute. Which of the following intelligence sources should to security analyst review?

Vulnerability feeds

Trusted automated exchange of indicator information

Structured threat information expression

Industry information-sharing and collaboration groups

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybersecurity department purchased o new PAM solution. The team is planning to randomize the service account credentials of the Windows server first. Which of the following would be the BEST method to increase the security on the Linux server?

Randomize the shared credentials

Use only guest accounts to connect.

Use SSH keys and remove generic passwords

Remove all user accounts.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a projected network segment. Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?

DNS sinkholding

DLP rules on the terminal

An IP blacklist

Application whitelisting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization has decided to host its web application and database in the cloud. Which of the following BEST describes the security concerns for this decision?

Access to the organization's servers could be exposed to other cloud-provider clients

The cloud vendor is a new attack vector within the supply chain

Outsourcing the code development adds risk to the cloud provider

Vendor support will cease when the hosting platforms reach EOL.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output:

Which of the following attacks does the analyst MOST likely see in this packet capture?

Session replay

Evil twin

Bluejacking

ARP poisoning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user recently attended an exposition and received some digital promotional materials. The user later noticed blue boxes popping up and disappearing on the computer, and reported receiving several spam emails, which the user did not open. Which of the following is MOST likely the cause of the reported issue?

There was a drive-by download of malware

The user installed a cryptominer

The OS was corrupted

There was malicious code on the USB drive

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A security analyst is performing a packet capture on a series of SOAP HTTP requests for a security assessment. The analyst redirects the output to a file After the capture is complete, the analyst needs to review the first transactions quickly and then search the entire series of requests for a particular string. Which of the following would be BEST to use to accomplish the task?

(Select TWO).

head

Tcpdump

grep

rail

curl

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?