cwicz4

cwicz4

4th Grade

37 Qs

quiz-placeholder

Similar activities

PBD Rekabentuk dan Teknologi Tahun 4 Part 1

PBD Rekabentuk dan Teknologi Tahun 4 Part 1

4th Grade

40 Qs

Architecture Pre-Test

Architecture Pre-Test

3rd - 5th Grade

37 Qs

 disney harry quzz

disney harry quzz

1st - 5th Grade

34 Qs

eddsworld quiz SP1W

eddsworld quiz SP1W

1st - 5th Grade

41 Qs

Chapter 8 Multimedia Authoring Software

Chapter 8 Multimedia Authoring Software

4th Grade

33 Qs

Barwy

Barwy

1st - 6th Grade

32 Qs

HTML & CSS

HTML & CSS

1st - 5th Grade

33 Qs

PTS 2 MATEMATIKA KELAS 5 SDN GUNUNGPUYUH CBM

PTS 2 MATEMATIKA KELAS 5 SDN GUNUNGPUYUH CBM

4th Grade - University

40 Qs

cwicz4

cwicz4

Assessment

Quiz

Design

4th Grade

Medium

Created by

malgorzata malgorzata

Used 11+ times

FREE Resource

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A web server has been compromised due to a ransomware attack. Further Investigation reveals the ransomware has been in the server for the past 72 hours. The systems administrator needs to get the services back up as soon as possible. Which of the following should the administrator use to restore services to a secure state?

The last incremental backup that was conducted 72 hours ago

The last known-good configuration stored by the operating system

The last full backup that was conducted seven days ago

The baseline OS configuration

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company recently experienced a significant data loss when proprietary information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage. Which of the following is the best mitigation strategy to prevent this from happening in the future?

User training

CAsB

MDM

EDR

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following

logs should be analyzed to identify the impacted host? (Select two).

Application

Authentication

Network

Firewall

System

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is most likely to contain ranked and ordered information on the likelihood and potential impact

of catastrophic events that may affect business processes and systems, while also highlighting the residual risks that need to be managed after mitigating controls have been implemented?

An RTO report

A risk register

A business impact analysis

An asset value register

A disaster recovery plan

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During an assessment, a systems administrator found several hosts running FTP and decided to immediately block FTP

communications at the firewall. Which of the following describes the greatest risk associated with using FTP?

Private data can be leaked

FTP is prohibited by internal policy.

Users can upload personal files

Credentials are sent in cleartext.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security professional wants to enhance the protection of a critical environment that is used to store and manage a company's encryption keys. The selected technology should be tamper resistant. Which of the following should the security professional implement to achieve the goal?

DLP

HSM

CA

FIM

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company's help desk has received calls about the wireless network being down and users being unable to connect to it. The network administrator says all access points are up and running One of the help desk technicians notices the affected users are working in a building near the parking lot. Which of the following is the most likely reason for the outage?

Someone near the building is jamming the signal

A user has set up a rogue access point near the building

Someone set up an evil twin access point in the affected area.

The APs in the affected area have been unplugged from the network

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?