
532 PT14
Authored by jaret valdez
Mathematics
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.332 Which of the following uses six initial steps that provide basic control over system security
by including hardware and software inventory, vulnerability management, and continuous
monitoring to minimize risk in all network environments?
(A). ISO 27701
(B). The Center for Internet Security
(C). SSAE SOC 2
(D). NIST Risk Management Framework
2.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
NO.333 A security analyst is hardening a network infrastructure. The analyst is given the following
requirements.
* Preserve the use of public IP addresses assigned to equipment on the core router.
* Enable "in transport 'encryption protection to the web server with the strongest ciphers.
Which of the following should the analyst implement to meet these requirements? (Select TWO).
(A). Configure VLANs on the core router
(B). Configure NAT on the core router
(C). Configure BGP on the core router
(D). Configure AES encryption on the web server
(F). Enable TLSv2 encryption on the web server
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.334 A security analyst is investigating a vulnerability in which a default file permission was set
incorrectly. The company uses non-credentialed scanning for vulnerability management.
Which of the following tools can the analyst use to verify the permissions?
(A). ssh
(B). chmod
(C). 1s
(D). setuid
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.335 Which of the following would BEST identify and remediate a data-loss event in an enterprise
using third-party, web-based services and file-sharing platforms?
(A). SIEM
(B). CASB
(C). UTM
(D). EDR
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.336 An organization wants to implement a third factor to an existing multifactor authentication.
The organization already uses a smart card and password. Which of the following would meet the
organization's needs for a third factor?
(A). Date of birth
(B). Fingerprints
(C). PIN
(D). TPM
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.337 Which of the following is the purpose of a risk register?
(A). To define the level or risk using probability and likelihood
(B). To register the risk with the required regulatory agencies
(C). To identify the risk, the risk owner, and the risk measures
(D). To formally log the type of risk mitigation strategy the organization is using
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
NO.338 A security analyst discovers that a company username and password database was posted
on an internet forum.
The username and passwords are stored in plan text. Which of the following would mitigate the
damage done by this type of data exfiltration in the future?
(A). Create DLP controls that prevent documents from leaving the network
(B). Implement salting and hashing
(C). Configure the web content filter to block access to the forum.
(D). Increase password complexity requirements
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?