Bns6pt3

Bns6pt3

University

25 Qs

quiz-placeholder

Similar activities

Geometry CP 6.7 Dilations Worksheet

Geometry CP 6.7 Dilations Worksheet

10th Grade - University

20 Qs

PSYC 2016 10/3

PSYC 2016 10/3

University

20 Qs

NCCER Carpentry Basic Stair

NCCER Carpentry Basic Stair

University

20 Qs

Customary Units of Measurement

Customary Units of Measurement

5th Grade - University

20 Qs

Understanding Loans and Their Types

Understanding Loans and Their Types

11th Grade - University

20 Qs

Significance Tests Review

Significance Tests Review

11th Grade - University

20 Qs

Understanding Home Buying Rules

Understanding Home Buying Rules

9th Grade - University

20 Qs

Basics of Thermodynamic Air cycles

Basics of Thermodynamic Air cycles

University

20 Qs

Bns6pt3

Bns6pt3

Assessment

Quiz

Mathematics

University

Hard

Created by

jaret valdez

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The security administrator isolated the switch on a separate VLAN and set up a patch routine. Which of the following steps should also be taken to harden the smart switch?

  1. Set up an air gap for the switch.

  1. Change the default password for the switch.

  1. Place the switch In a Faraday cage.

  1. Install a cable lock on the switch

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following describes the BEST approach for deploying application patches?

  1. Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.

  1. Test the patches in a staging environment, develop against them in the development environment, and then apply them to the production systems

  1. Test the patches m a test environment apply them to the production systems and then apply them to a staging environment

  1. Apply the patches to the production systems apply them in a staging environment, and then test all of them in a testing environment

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security engineer needs to enhance MA access to sensitive areas in a building. A key card and fingerprint scan are already in use. Which of the following would add another factor of authentication?

  1. Hard token

  1. Retina scan

  1. SMS text

  1. Keypad PIN

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A symmetric encryption algorithm is BEST suited for:

  1. key-exchange scalability.

  1. protecting large amounts of data.

  1. providing hashing capabilities,

  1. implementing non-repudiation.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company has limited storage available and online presence that cannot for more than four hours. Which of the following backup methodologies should the company implement to allow for the FASTEST database restore time In the event of a failure, which being maindful of the limited available storage space?

  1. Implement fulltape backup every Sunday at 8:00 p.m and perform nightly tape rotations.

  1. Implement different backups every Sunday at 8:00 and nightly incremental backups at 8:00 p.m

  1. Implement nightly full backups every Sunday at 8:00 p.m

  1. Implement full backups every Sunday at 8:00 p.m and nightly differential backups at 8:00

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst is reviewing information regarding recent vulnerabilities. Which of the following will the analyst MOST likely consult to validate which platforms have been affected?

  1. OSINT

  1. SIEM

  1. CVSS

  1. CVE

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst needs to produce a document that details how a security incident occurred, the steps that were taken for recovery, and how tuture incidents can be avoided. During which ot the following stages of the response process will this activity take place?

  1. Recovery

  1. Identification

  1. Lessons learned

  1. Preparation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?