You are security administrator investigating a potential infection on a network.
Click on each host and firewall. Review all logs to determine which host originated the Infecton and
then deny each remaining hosts clean or infected.
101-120
Quiz
•
Computers
•
Professional Development
•
Easy
Bilal Karaaslan
Used 20+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
You are security administrator investigating a potential infection on a network.
Click on each host and firewall. Review all logs to determine which host originated the Infecton and
then deny each remaining hosts clean or infected.
.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?
RDP server
Jump server
Proxy server
Hypervisor
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)
Impersonation
Phishing
Smishing
Vishing
Typosquatting
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer's PII?
SCAP
Net Flow
Antivirus
DLP
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following involves an attempt to take advantage of database misconfigurations?
Buffer overflow
SQL injection
VM escape
Memory injection
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?
Concurrent session usage
Secure DNS cryptographic downgrade
On-path resource consumption
Reflected denial of service
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following roles, according to the shared responsibility model, is responsible for securing the company's database in an IaaS model for a cloud environment?
Client
Third-party vendor
Cloud provider
DBA
20 questions
VMware Certified Professional - DCV 2V0-21.23
Quiz
•
Professional Development
22 questions
Exam Questions NSE4_FGT-7.0 Fortinet NSE 4 - FortiOS 7.0
Quiz
•
Professional Development
15 questions
Sec+ Quiz - 1
Quiz
•
Professional Development
15 questions
Security+ Study Guide-01 Mastering Security Basics
Quiz
•
Professional Development
22 questions
OSPF Protocol
Quiz
•
University - Professi...
20 questions
Part 4.3
Quiz
•
Professional Development
15 questions
Sec+ CH.2 Review Test
Quiz
•
Professional Development
15 questions
Security+ 701 - Quiz 2
Quiz
•
Professional Development
15 questions
Multiplication Facts
Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz
Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set
Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025
Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)
Quiz
•
9th - 12th Grade
15 questions
June Review Quiz
Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles
Quiz
•
8th Grade
25 questions
Triangle Inequalities
Quiz
•
10th - 12th Grade