
Security + quiz 19

Quiz
•
Instructional Technology
•
Professional Development
•
Hard

Matt Hansen
Used 1+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios BEST describes a risk reduction technique?
A security control objective cannot be met through a technical change, so the company purchases insurance and is no longer concerned about losses from data breaches.
A security control objective cannot be met through a technical change, so the company implements a policy to train users on a more secure method of operation.
A security control objective cannot be met through a technical change, so the company changes as method of operation
A security control objective cannot be met through a technical change, so the Chief Information Officer (CIO) decides to sign off on the risk.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?
SED
HSM
DLP
TPM
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An end user reports a computer has been acting slower than normal for a few weeks. During an
investigation, an analyst determines the system is sending the user's email address and a tendigit number to an IP address once a day. The only recent log entry regarding the user's
computer is the following:
Time: 06:32:29 UTC
Event Description: This file meets the ML algorithm's medium-confidence threshold.
Process Blocked: False
File Quarantined: False
Operating System: Windows 10
File Name: \Device\HarddiskVolume4\Users\jdoe\AppData\Local\Microsoft\Windows\INetCache\IE\pdftodcx.msi
Connection Details: 35.242.219.204:80
Which of the following is the MOST likely cause of the issue?
The end user purchased and installed a PUP from a web browser
A bot on the computer is brute forcing passwords against a website
A hacker is attempting to exfiltrate sensitive data
Ransomware is communicating with a command-and-control server.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?
An attacker is sniffing traffic to port 53, and the server is managed using unencrypted usernames and passwords.
An organization is experiencing excessive traffic on port 53 and suspects an attacker is trying to DoS the domain name server.
Malware trying to resolve an unregistered domain name to determine if it is running in an isolated sandbox
Routing tables have been compromised, and an attacker is rerouting traffic to malicious websites
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the cause of the access issues?
False rejection
Cross-over error rate
Efficacy rale
Attestation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial option article in a national newspaper, which may result in new cyberattacks Which of the following would be BEST for the security manager to use in a threat mode?
Hacktivists
White-hat hackers
Script kiddies
Insider threats
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?
Tokenization
Data masking
Normalization
Obfuscation
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
IT General Control

Quiz
•
Professional Development
15 questions
ACTIVITY IN TLE 502

Quiz
•
Professional Development
11 questions
Week 2 - OS

Quiz
•
Professional Development
10 questions
AI & Pedagogy Test

Quiz
•
Professional Development
11 questions
GA Recon Team Building

Quiz
•
KG - Professional Dev...
12 questions
Server & Storage Consolidation

Quiz
•
Professional Development
10 questions
ED60601 Ch. 4 Quiz

Quiz
•
Professional Development
10 questions
az-104_module-6

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade