101-120
Quiz
•
Computers
•
Professional Development
•
Easy
Bilal Karaaslan
Used 20+ times
FREE Resource
Enhance your content
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
You are security administrator investigating a potential infection on a network.
Click on each host and firewall. Review all logs to determine which host originated the Infecton and
then deny each remaining hosts clean or infected.
.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?
RDP server
Jump server
Proxy server
Hypervisor
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)
Impersonation
Phishing
Smishing
Vishing
Typosquatting
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer's PII?
SCAP
Net Flow
Antivirus
DLP
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following involves an attempt to take advantage of database misconfigurations?
Buffer overflow
SQL injection
VM escape
Memory injection
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?
Concurrent session usage
Secure DNS cryptographic downgrade
On-path resource consumption
Reflected denial of service
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following roles, according to the shared responsibility model, is responsible for securing the company's database in an IaaS model for a cloud environment?
Client
Third-party vendor
Cloud provider
DBA
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
24 questions
CompTIA A+ 1001 Set #2 (short set)
Quiz
•
Professional Development
20 questions
DBMS-QUIZ
Quiz
•
Professional Development
15 questions
Activity2
Quiz
•
Professional Development
15 questions
It jobs
Quiz
•
Professional Development
17 questions
Examen
Quiz
•
Professional Development
20 questions
Part 1.8
Quiz
•
Professional Development
15 questions
Part 5.5
Quiz
•
Professional Development
20 questions
MS-102 ADMINISTRATOR MICROSOFT 365
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade