Sec+ Practice Test_2

Sec+ Practice Test_2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

20 Qs

Sec+ CH.1 Review Test

Sec+ CH.1 Review Test

Professional Development

15 Qs

Cybersecurity

Cybersecurity

Professional Development

10 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

City & Guilds Level 3 Apprenticeship Coding and Logic

City & Guilds Level 3 Apprenticeship Coding and Logic

Professional Development

20 Qs

Sec+ CH.2 Review Test

Sec+ CH.2 Review Test

Professional Development

15 Qs

Security and Domain

Security and Domain

Professional Development

20 Qs

IT General Control

IT General Control

Professional Development

10 Qs

Sec+ Practice Test_2

Sec+ Practice Test_2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Eitan A

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

The new Chief Information Security Officer at a company has asked the security team to implement stronger user account policies. The new policies require:

• Users to choose a password unique to their last ten passwords

• Users to not log in from certain high-risk countries

Which of the following should the security team implement? (Select TWO).

Password complexity

Password history

Geolocation

Geofencing

Geotagging

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following explains why RTO is included in a BIA?

It identifies the amount of allowable downtime for an application or system,

It prioritizes risks, so the organization can allocate resources appropriately,

It monetizes the loss of an asset and determines a break-even point for risk mitigation.

It informs the backup approach so that the organization can recover data at a known time.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following uses SAML for authentication?

TOTP

Federation

Kerberos

HOTP

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a policy that provides a greater depth and breadth of knowledge across an organization?

Asset management policy

Separation of duties policy

Acceptable use policy

Job Rotation policy

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user reports falling for a phishing email to an analyst. Which of the following system logs would the analyst check FIRST?

DNS

Message gateway

Network

Authentication

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A cyber-security administrator is using an enterprise firewall. The administrator created some rules, but now seems to be unresponsive. All connections being dropped by the firewall. Which of the following would be the BEST option to remove the rules?

# iptables -t mangle -x

# iptables -f

# iptables -z

# iptables -p input -j drop

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst has been tasked with finding the maximum amount of data loss that can occur before ongoing business operations would be impacted. Which of the following terms BEST defines this metric?

MTTR

RTO

RPO

MTBF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?