Search Header Logo

BNS6 PT6

Authored by jaret valdez

Mathematics

University

BNS6 PT6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?

  1. An attacker is sniffing traffic to port 53, and the server is managed using unencrypted usernames and passwords.

  1. An organization is experiencing excessive traffic on port 53 and suspects an attacker is trying to DoS

the domain name server

  1. Malware trying to resolve an unregistered domain name to determine if it is running in an isolated sandbox

  1. Routing tables have been compromised, and an attacker is rerouting traffic to malicious websites

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility.

Which of the following MOST likely the cause of the cause of the access issues?

  1. False rejection

  1. Cross-over error rate

  1. Efficacy rale

Attestation

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial opinion article in a national newspaper, which may result in new cyberattacks.

Which of the following would be BEST for the security manager to use in a threat model?

  1. Hacktivists

  1. White-hat hackers

  1. Script kiddies

  1. Insider threats

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?

  1. Tokenization

  1. Data masking

  1. Normalization

Obfuscation

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?

TLS

PFS

ESP

AH

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A company has determined that if its computer-based manufacturing is not functioning for 12 consecutive hours, it will lose more money that it costs to maintain the equipment. Which of the following must be less than 12 hours to maintain a positive total cost of ownership?

  1. MTBF

RPO

RTO

MTTR

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following control sets should a well -written BCP include? (Select THREE)

  1. Preventive

  1. Detective

  1. Corrective

  1. Recovery

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?