SEC+ 026-050

SEC+ 026-050

1st Grade

25 Qs

quiz-placeholder

Similar activities

CMD MBT Wireless Network

CMD MBT Wireless Network

1st - 3rd Grade

20 Qs

KS3 Networking Quiz

KS3 Networking Quiz

1st - 3rd Grade

24 Qs

Quick Quiz After Mid Sem

Quick Quiz After Mid Sem

1st Grade

20 Qs

Linux OS - Ubuntu

Linux OS - Ubuntu

1st Grade

20 Qs

Microsoft Server Admin 98-365 Part 6

Microsoft Server Admin 98-365 Part 6

KG - Professional Development

20 Qs

Hardware & Software

Hardware & Software

KG - University

20 Qs

SDLC

SDLC

1st Grade

20 Qs

SalesForce

SalesForce

1st - 2nd Grade

27 Qs

SEC+ 026-050

SEC+ 026-050

Assessment

Quiz

Computers

1st Grade

Easy

Created by

Team Spirit

Used 52+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:26
Which of the following is the best reason to complete an audit in a banking environment?

Regulatory requirement

Organizational change

Self-assessment requirement

Service-level requirement

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Question #:27
A security analyst reviews domain activity logs and notices the following:

Which of the following is the best explanation for what the security analyst has discovered?

The user jsmith's account has been locked out.

A keylogger is installed on [smith's workstation

An attacker is attempting to brute force ismith's account.

Ransomware has been deployed in the domain.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:28
A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer data. Which of the following should the administrator do first?

Block access to cloud storage websites.

Create a rule to block outgoing email attachments

Apply classifications to the data.

Remove all user permissions from shares on the file server.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:29
Which of the following describes the process of concealing code or text inside a graphical image?

Symmetric encryption

Hashing

Data masking

Steganography

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Question #:30
Which of the following must be considered when designing a high-availability network? (Select two).

Ease of recovery

Ability to patch

Physical isolation

Responsiveness

Attack surface

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:31
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

SSO

LEAP

MFA

PEAP

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #:32
Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?

Client


Third-party vendor

Cloud provider

DBA

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?