SEC+ 001-025

SEC+ 001-025

Professional Development

25 Qs

quiz-placeholder

Similar activities

Microsoft Excel

Microsoft Excel

KG - Professional Development

20 Qs

Salesforce Developer

Salesforce Developer

Professional Development

20 Qs

Python - List (metods)

Python - List (metods)

Professional Development

20 Qs

Kushal Yuva Program (KYP04020033) Part 3

Kushal Yuva Program (KYP04020033) Part 3

Professional Development

20 Qs

Revision Test

Revision Test

Professional Development

20 Qs

Nintendo Wii

Nintendo Wii

3rd Grade - Professional Development

20 Qs

VIDEOJUEGOS-CMSB

VIDEOJUEGOS-CMSB

1st Grade - Professional Development

20 Qs

Introduction to Machine Learning

Introduction to Machine Learning

University - Professional Development

20 Qs

SEC+ 001-025

SEC+ 001-025

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

Team Spirit

Used 61+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #:1

A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?

A

SPF

B

GPO

C

NAC

D

FIM

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #:2

The local administrator account for a company's VPN appliance was unexpectedly used to log in to the remote management interface. Which of the following would have most likely prevented this from happening'?

A

Using least privilege

B

Changing the default password

C

Assigning individual user IDs

D

Reviewing logs more frequently

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #:3

A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the increase of ransomware-as-a-service in a report to the management team. Which of the following best describes the threat actor in the CISO's report?

A

Insider threat

B

Hacktivist

C

Nation-state

D

Organized crime

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #:4

A security consultant needs secure, remote access to a client environment. Which of the following should the

security consultant most likely use to gain access?

A

EAP

B

DHCP

C

IPSec

D

NAT

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #:5

A systems administrator set up a perimeter firewall but continues to notice suspicious connections between internal endpoints. Which of the following should be set up in order to mitigate the threat posed by the suspicious activity?

A

Host-based firewall

B

Web application firewall

C

Access control list

D

Application allow list

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #:6

An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?

A

Compromise

B

Retention

C

Analysis

D

Transfer

E

Inventory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #:7

Which of the following is a hardware-specific vulnerability?

A

Firmware version

B

Buffer overflow

C

SQL injection

D

Cross-site scripting

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?