Security+ SY0-701

Security+ SY0-701

University

15 Qs

quiz-placeholder

Similar activities

Vulnerability Research and Tools

Vulnerability Research and Tools

University

15 Qs

Introduction to database systems

Introduction to database systems

University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

18 Qs

Introduction to Database

Introduction to Database

University

10 Qs

Database

Database

12th Grade - University

20 Qs

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

Cloud Computing

Cloud Computing

University

10 Qs

SecOps Quiz

SecOps Quiz

University

16 Qs

Security+ SY0-701

Security+ SY0-701

Assessment

Quiz

Computers

University

Easy

Created by

Eng Networks

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Image

A security analyst is reviewing the following logs:

Which of the following attacks is most likely occurring?


Password spraying

Account forgery

Pass-the-hash

Brute-force

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?

Hardening

Employee monitoring

Configuration enforcement

Least privilege

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following enables the use of an input field to run commands that can view or manipulate data?


Cross-site scripting

Side loading

Buffer overflow

SQL injection

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?


Corrective

Preventive

Deterrent

Detective

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

Changing the remote desktop port to a non-standard number

Setting up a VPN and placing the jump server inside the firewall

Using a proxy for web connections from the remote desktop server

Connecting the remote server to the domain and increasing the password length

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A systems administrator is working on a solution with the following requirements:
• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?

Zero Trust

AAA

Non-repudiation

CIA

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A retail company processes credit card payments and must comply with PCI DSS requirements. The IT team needs to secure sensitive cardholder data at rest.

Question:
Which of the following is the most appropriate solution?

Encrypt data using AES-256 and restrict access to authorized personnel.

Hash the cardholder data using MD5 for long-term storage.

Store cardholder data in plain text on a secure server.

Use SSL/TLS to transmit cardholder data securely.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?