532 PT14

532 PT14

University

25 Qs

quiz-placeholder

Similar activities

PSME QUIZ BEE ROUND 2

PSME QUIZ BEE ROUND 2

University

30 Qs

Dilation Part 1

Dilation Part 1

7th Grade - University

20 Qs

Derivative of Inverse Function

Derivative of Inverse Function

12th Grade - University

20 Qs

CIRCLE

CIRCLE

6th Grade - University

20 Qs

Percentages Miss C D

Percentages Miss C D

6th Grade - University

20 Qs

Segments Within Circles

Segments Within Circles

10th Grade - University

20 Qs

Graphing and Proportions

Graphing and Proportions

7th Grade - University

20 Qs

Margin of Error Calculations

Margin of Error Calculations

12th Grade - University

20 Qs

532 PT14

532 PT14

Assessment

Quiz

Mathematics

University

Hard

Created by

jaret valdez

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.332 Which of the following uses six initial steps that provide basic control over system security

by including hardware and software inventory, vulnerability management, and continuous

monitoring to minimize risk in all network environments?

(A). ISO 27701

(B). The Center for Internet Security

(C). SSAE SOC 2

(D). NIST Risk Management Framework

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

NO.333 A security analyst is hardening a network infrastructure. The analyst is given the following

requirements.

* Preserve the use of public IP addresses assigned to equipment on the core router.

* Enable "in transport 'encryption protection to the web server with the strongest ciphers.

Which of the following should the analyst implement to meet these requirements? (Select TWO).

(A). Configure VLANs on the core router

(B). Configure NAT on the core router

(C). Configure BGP on the core router

(D). Configure AES encryption on the web server

(F). Enable TLSv2 encryption on the web server

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.334 A security analyst is investigating a vulnerability in which a default file permission was set

incorrectly. The company uses non-credentialed scanning for vulnerability management.

Which of the following tools can the analyst use to verify the permissions?

(A). ssh

(B). chmod

(C). 1s

(D). setuid

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.335 Which of the following would BEST identify and remediate a data-loss event in an enterprise

using third-party, web-based services and file-sharing platforms?

(A). SIEM

(B). CASB

(C). UTM

(D). EDR

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.336 An organization wants to implement a third factor to an existing multifactor authentication.

The organization already uses a smart card and password. Which of the following would meet the

organization's needs for a third factor?

(A). Date of birth

(B). Fingerprints

(C). PIN

(D). TPM

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.337 Which of the following is the purpose of a risk register?

(A). To define the level or risk using probability and likelihood

(B). To register the risk with the required regulatory agencies

(C). To identify the risk, the risk owner, and the risk measures

(D). To formally log the type of risk mitigation strategy the organization is using

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

NO.338 A security analyst discovers that a company username and password database was posted

on an internet forum.

The username and passwords are stored in plan text. Which of the following would mitigate the

damage done by this type of data exfiltration in the future?

(A). Create DLP controls that prevent documents from leaving the network

(B). Implement salting and hashing

(C). Configure the web content filter to block access to the forum.

(D). Increase password complexity requirements

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?