BNS6 PT6

BNS6 PT6

University

28 Qs

quiz-placeholder

Similar activities

Net Pay/Federal Income Tax

Net Pay/Federal Income Tax

12th Grade - University

30 Qs

Linear Vs. Exponential Functions

Linear Vs. Exponential Functions

9th Grade - University

25 Qs

Banking Basics: Accounts and Reconciliation

Banking Basics: Accounts and Reconciliation

11th Grade - University

25 Qs

CHECKING ACCOUNT TEST(5-7)

CHECKING ACCOUNT TEST(5-7)

10th Grade - University

25 Qs

Industrial Robotics Quiz

Industrial Robotics Quiz

University

30 Qs

JMC Test 06 - 03/09/2022 (Aug 29 to Sep 02)

JMC Test 06 - 03/09/2022 (Aug 29 to Sep 02)

University

30 Qs

MAS202_Chap 2-3-4

MAS202_Chap 2-3-4

University

25 Qs

Dispozitive Periferice

Dispozitive Periferice

8th Grade - University

23 Qs

BNS6 PT6

BNS6 PT6

Assessment

Quiz

Mathematics

University

Hard

Created by

jaret valdez

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?

  1. An attacker is sniffing traffic to port 53, and the server is managed using unencrypted usernames and passwords.

  1. An organization is experiencing excessive traffic on port 53 and suspects an attacker is trying to DoS

the domain name server

  1. Malware trying to resolve an unregistered domain name to determine if it is running in an isolated sandbox

  1. Routing tables have been compromised, and an attacker is rerouting traffic to malicious websites

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility.

Which of the following MOST likely the cause of the cause of the access issues?

  1. False rejection

  1. Cross-over error rate

  1. Efficacy rale

Attestation

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial opinion article in a national newspaper, which may result in new cyberattacks.

Which of the following would be BEST for the security manager to use in a threat model?

  1. Hacktivists

  1. White-hat hackers

  1. Script kiddies

  1. Insider threats

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?

  1. Tokenization

  1. Data masking

  1. Normalization

Obfuscation

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?

TLS

PFS

ESP

AH

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A company has determined that if its computer-based manufacturing is not functioning for 12 consecutive hours, it will lose more money that it costs to maintain the equipment. Which of the following must be less than 12 hours to maintain a positive total cost of ownership?

  1. MTBF

RPO

RTO

MTTR

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following control sets should a well -written BCP include? (Select THREE)

  1. Preventive

  1. Detective

  1. Corrective

  1. Recovery

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?