Security+ SY0-701

Security+ SY0-701

University

15 Qs

quiz-placeholder

Similar activities

Wireless Networks

Wireless Networks

11th Grade - University

10 Qs

98-366 Lesson 6 Networking Services

98-366 Lesson 6 Networking Services

10th Grade - University

19 Qs

Review: Information Assurance and Security

Review: Information Assurance and Security

University

20 Qs

ASI 4

ASI 4

University

15 Qs

FQuiz3 BSIT4C

FQuiz3 BSIT4C

University

15 Qs

uas-siber

uas-siber

University

10 Qs

Database

Database

12th Grade - University

20 Qs

Ethical Hacking Practice Quiz

Ethical Hacking Practice Quiz

University

20 Qs

Security+ SY0-701

Security+ SY0-701

Assessment

Quiz

Computers

University

Easy

Created by

Eng Networks

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

A security analyst is reviewing the following logs:

Which of the following attacks is most likely occurring?


Password spraying

Account forgery

Pass-the-hash

Brute-force

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?

Hardening

Employee monitoring

Configuration enforcement

Least privilege

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following enables the use of an input field to run commands that can view or manipulate data?


Cross-site scripting

Side loading

Buffer overflow

SQL injection

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?


Corrective

Preventive

Deterrent

Detective

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

Changing the remote desktop port to a non-standard number

Setting up a VPN and placing the jump server inside the firewall

Using a proxy for web connections from the remote desktop server

Connecting the remote server to the domain and increasing the password length

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A systems administrator is working on a solution with the following requirements:
• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?

Zero Trust

AAA

Non-repudiation

CIA

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A retail company processes credit card payments and must comply with PCI DSS requirements. The IT team needs to secure sensitive cardholder data at rest.

Question:
Which of the following is the most appropriate solution?

Encrypt data using AES-256 and restrict access to authorized personnel.

Hash the cardholder data using MD5 for long-term storage.

Store cardholder data in plain text on a secure server.

Use SSL/TLS to transmit cardholder data securely.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?