A security analyst is reviewing the following logs:
Which of the following attacks is most likely occurring?
Security+ SY0-701
Quiz
•
Computers
•
University
•
Easy
Eng Networks
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A security analyst is reviewing the following logs:
Which of the following attacks is most likely occurring?
Password spraying
Account forgery
Pass-the-hash
Brute-force
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?
Hardening
Employee monitoring
Configuration enforcement
Least privilege
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following enables the use of an input field to run commands that can view or manipulate data?
Cross-site scripting
Side loading
Buffer overflow
SQL injection
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?
Corrective
Preventive
Deterrent
Detective
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?
Changing the remote desktop port to a non-standard number
Setting up a VPN and placing the jump server inside the firewall
Using a proxy for web connections from the remote desktop server
Connecting the remote server to the domain and increasing the password length
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A systems administrator is working on a solution with the following requirements:
• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?
Zero Trust
AAA
Non-repudiation
CIA
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A retail company processes credit card payments and must comply with PCI DSS requirements. The IT team needs to secure sensitive cardholder data at rest.
Question:
Which of the following is the most appropriate solution?
Encrypt data using AES-256 and restrict access to authorized personnel.
Hash the cardholder data using MD5 for long-term storage.
Store cardholder data in plain text on a secure server.
Use SSL/TLS to transmit cardholder data securely.
20 questions
Database
Quiz
•
12th Grade - University
15 questions
DBMS
Quiz
•
University
10 questions
MS Access Database
Quiz
•
KG - University
10 questions
DBMS
Quiz
•
University
20 questions
Network Security
Quiz
•
University
16 questions
Computer Network Basics
Quiz
•
University
20 questions
Introduction to Database
Quiz
•
University
17 questions
SEXXC ++
Quiz
•
University
15 questions
Multiplication Facts
Quiz
•
4th Grade
20 questions
Math Review - Grade 6
Quiz
•
6th Grade
20 questions
math review
Quiz
•
4th Grade
5 questions
capitalization in sentences
Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance
Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions
Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines
Quiz
•
Professional Development
12 questions
Dividing Fractions
Quiz
•
6th Grade