SEC+ 001-025
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Easy
Team Spirit
Used 61+ times
FREE Resource
Enhance your content in a minute
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #:1
A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?
A
SPF
B
GPO
C
NAC
D
FIM
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #:2
The local administrator account for a company's VPN appliance was unexpectedly used to log in to the remote management interface. Which of the following would have most likely prevented this from happening'?
A
Using least privilege
B
Changing the default password
C
Assigning individual user IDs
D
Reviewing logs more frequently
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #:3
A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the increase of ransomware-as-a-service in a report to the management team. Which of the following best describes the threat actor in the CISO's report?
A
Insider threat
B
Hacktivist
C
Nation-state
D
Organized crime
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #:4
A security consultant needs secure, remote access to a client environment. Which of the following should the
security consultant most likely use to gain access?
A
EAP
B
DHCP
C
IPSec
D
NAT
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #:5
A systems administrator set up a perimeter firewall but continues to notice suspicious connections between internal endpoints. Which of the following should be set up in order to mitigate the threat posed by the suspicious activity?
A
Host-based firewall
B
Web application firewall
C
Access control list
D
Application allow list
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #:6
An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?
A
Compromise
B
Retention
C
Analysis
D
Transfer
E
Inventory
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #:7
Which of the following is a hardware-specific vulnerability?
A
Firmware version
B
Buffer overflow
C
SQL injection
D
Cross-site scripting
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
PC Troubleshooting
Quiz
•
Professional Development
20 questions
FUNDAMENTAL OF COMPUTER
Quiz
•
Professional Development
20 questions
U.T. 7: Configuración de Routers y Encaminamiento
Quiz
•
Professional Development
20 questions
MS OFFICE QUIZ 01
Quiz
•
Professional Development
20 questions
Technology
Quiz
•
Professional Development
20 questions
Round-1 Technical Aptitude
Quiz
•
11th Grade - Professi...
20 questions
Network MG
Quiz
•
Professional Development
20 questions
DBMS-QUIZ
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
