532 PT14

532 PT14

University

25 Qs

quiz-placeholder

Similar activities

Heights and Distances

Heights and Distances

10th Grade - University

20 Qs

Exponential Graphs Review

Exponential Graphs Review

9th Grade - University

20 Qs

The Mathematics of Graphs

The Mathematics of Graphs

University

20 Qs

Category 4

Category 4

9th Grade - University

20 Qs

NCCER Carpentry Basic Stair

NCCER Carpentry Basic Stair

University

20 Qs

Rationalizing the Denominator

Rationalizing the Denominator

11th Grade - University

20 Qs

[Algebra 2] 2-4 Dividing Polynomials

[Algebra 2] 2-4 Dividing Polynomials

9th Grade - University

20 Qs

DCA Retest

DCA Retest

University

20 Qs

532 PT14

532 PT14

Assessment

Quiz

Mathematics

University

Hard

Created by

jaret valdez

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.332 Which of the following uses six initial steps that provide basic control over system security

by including hardware and software inventory, vulnerability management, and continuous

monitoring to minimize risk in all network environments?

(A). ISO 27701

(B). The Center for Internet Security

(C). SSAE SOC 2

(D). NIST Risk Management Framework

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

NO.333 A security analyst is hardening a network infrastructure. The analyst is given the following

requirements.

* Preserve the use of public IP addresses assigned to equipment on the core router.

* Enable "in transport 'encryption protection to the web server with the strongest ciphers.

Which of the following should the analyst implement to meet these requirements? (Select TWO).

(A). Configure VLANs on the core router

(B). Configure NAT on the core router

(C). Configure BGP on the core router

(D). Configure AES encryption on the web server

(F). Enable TLSv2 encryption on the web server

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.334 A security analyst is investigating a vulnerability in which a default file permission was set

incorrectly. The company uses non-credentialed scanning for vulnerability management.

Which of the following tools can the analyst use to verify the permissions?

(A). ssh

(B). chmod

(C). 1s

(D). setuid

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.335 Which of the following would BEST identify and remediate a data-loss event in an enterprise

using third-party, web-based services and file-sharing platforms?

(A). SIEM

(B). CASB

(C). UTM

(D). EDR

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.336 An organization wants to implement a third factor to an existing multifactor authentication.

The organization already uses a smart card and password. Which of the following would meet the

organization's needs for a third factor?

(A). Date of birth

(B). Fingerprints

(C). PIN

(D). TPM

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.337 Which of the following is the purpose of a risk register?

(A). To define the level or risk using probability and likelihood

(B). To register the risk with the required regulatory agencies

(C). To identify the risk, the risk owner, and the risk measures

(D). To formally log the type of risk mitigation strategy the organization is using

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.338 A security analyst discovers that a company username and password database was posted

on an internet forum.

The username and passwords are stored in plan text. Which of the following would mitigate the

damage done by this type of data exfiltration in the future?

(A). Create DLP controls that prevent documents from leaving the network

(B). Implement salting and hashing

(C). Configure the web content filter to block access to the forum.

(D). Increase password complexity requirements

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Mathematics