532 PT 11

532 PT 11

University

25 Qs

quiz-placeholder

Similar activities

SA and Volume of Spheres

SA and Volume of Spheres

10th Grade - University

20 Qs

Basic concepts in statistical inference

Basic concepts in statistical inference

University

20 Qs

DM QUIZ 1

DM QUIZ 1

University

20 Qs

Operations modeling (Quiz II)

Operations modeling (Quiz II)

University

20 Qs

MA.3.M.1.1 & MA.3.M.1.2

MA.3.M.1.1 & MA.3.M.1.2

3rd Grade - University

20 Qs

Algebra Milestone Practice

Algebra Milestone Practice

10th Grade - University

20 Qs

Perimeter

Perimeter

3rd Grade - University

20 Qs

Determinant

Determinant

University

20 Qs

532 PT 11

532 PT 11

Assessment

Quiz

Mathematics

University

Hard

Created by

jaret valdez

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.256 An organization's corporate offices were destroyed due to a natural disaster, so the

organization is now setting up offices in a temporary work space. Which of the following will the

organization MOST likely consult?

(A). The business continuity plan

(B). The disaster recovery plan

.(C). The communications plan

(D). The incident response plan

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.257 Which of the following describes the ability of code to target a hypervisor from inside

(A). Fog computing

(B). VM escape

(C). Software-defined networking

(D). Image forgery

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.258 An information security policy stales that separation of duties is required for all highly

sensitive database changes that involve customers' financial data. Which of the following will this be

BEST to prevent?

(A). Least privilege

(B). An insider threat

(C). A data breach

(D). A change control violation

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.259 A user recent an SMS on a mobile phone that asked for bank delays. Which of the following

social-engineering techniques was used in this case?

(A). SPIM

(B). Vishing

(C). Spear phishing

(D). Smishing

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.260 A company wants to deploy PKI on its Internet-facing website. The applications that are

currently deployed are:

* www.company.com (main website)

* contactus.company.com (for locating a nearby location)

* quotes.company.com (for requesting a price quote)

The company wants to purchase one SSL certificate that will work for all the existing applications and

any future applications that follow the same naming conventions, such as store.company.com. Which

of the following certificate types would BEST meet the requirements?

A. SAN

B. Wildcard

C. Extended validation

D. self-signed

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.261 An attack relies on an end user visiting a website the end user would typically visit, however,

the site is compromised and uses vulnerabilities in the end users browser to deploy malicious

software. Which of the blowing types of attack does this describe?

(A). Smishing

(B). Whaling

(C). Watering hole

(D). Phishing

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

NO.262 Which of the following will MOST likely adversely impact the operations of unpatched

traditional programmable-logic controllers, running a back-end LAMP server and OT systems with

human-management interfaces that are accessible over the Internet via a web interface? (Choose

two.)

(A). Cross-site scripting

(B). Data exfiltration

(C). Poor system logging

(D). Weak encryption

(F). Server-side request forgery

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?