Sec+ Practice Test_2

Sec+ Practice Test_2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Python Data Structures & Statements

Python Data Structures & Statements

Professional Development

11 Qs

business 1.4 revision

business 1.4 revision

KG - Professional Development

20 Qs

PLAL Agile Onboarding

PLAL Agile Onboarding

Professional Development

10 Qs

Exam Prep 1

Exam Prep 1

Professional Development

10 Qs

vpsdbs

vpsdbs

KG - Professional Development

20 Qs

1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni

1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni

University - Professional Development

20 Qs

20764 - SQL - Mod 5 and 6

20764 - SQL - Mod 5 and 6

Professional Development

18 Qs

How Well Do You Them?

How Well Do You Them?

Professional Development

10 Qs

Sec+ Practice Test_2

Sec+ Practice Test_2

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Eitan A

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

The new Chief Information Security Officer at a company has asked the security team to implement stronger user account policies. The new policies require:

• Users to choose a password unique to their last ten passwords

• Users to not log in from certain high-risk countries

Which of the following should the security team implement? (Select TWO).

Password complexity

Password history

Geolocation

Geofencing

Geotagging

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following explains why RTO is included in a BIA?

It identifies the amount of allowable downtime for an application or system,

It prioritizes risks, so the organization can allocate resources appropriately,

It monetizes the loss of an asset and determines a break-even point for risk mitigation.

It informs the backup approach so that the organization can recover data at a known time.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following uses SAML for authentication?

TOTP

Federation

Kerberos

HOTP

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a policy that provides a greater depth and breadth of knowledge across an organization?

Asset management policy

Separation of duties policy

Acceptable use policy

Job Rotation policy

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user reports falling for a phishing email to an analyst. Which of the following system logs would the analyst check FIRST?

DNS

Message gateway

Network

Authentication

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A cyber-security administrator is using an enterprise firewall. The administrator created some rules, but now seems to be unresponsive. All connections being dropped by the firewall. Which of the following would be the BEST option to remove the rules?

# iptables -t mangle -x

# iptables -f

# iptables -z

# iptables -p input -j drop

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst has been tasked with finding the maximum amount of data loss that can occur before ongoing business operations would be impacted. Which of the following terms BEST defines this metric?

MTTR

RTO

RPO

MTBF

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?