
Security 4

Quiz
•
Other
•
University
•
Easy
Joe Smith
Used 3+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator is working on a project to deploy a load balancer in the company's cloud environment. Which of the following fundamental security requirements does this project fulfil?
Privacy
Integrity
Confidentiality
Availability
Answer explanation
Availability is the correct answer because deploying a load balancer enhances the availability of applications and services by distributing traffic, providing redundancy, and ensuring continued access to resources even in the event of server failures. This project directly supports the availability aspect of the security triad.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A systems administrator is changing the password policy within an enterprise environment and wants this update implemented on all systems as quickly as possible. Which of the following operating system security measures will the administrator most likely use?
Deploying PowerShell scripts
Pushing GPO update
Enabling PAP
Updating EDR profiles
Answer explanation
Group Policy Objects (GPOs) provides an infrastructure for centralized configuration management of the Windows operating system and applications that run on the operating system. GPOs are a collection of settings that define what a system will look like and how it will behave for a defined group of computers or users.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?
ARO
RTO
RPO
ALE
SLE
Answer explanation
ARO: Annual Rate of Occurrence
RTO: Recovery Time Objective
RPO: Recovery Point Objective
ALE: Annual Loss Expectancy
SLE: Single Loss Expectancy
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?
Key stretching
Tokenization
Data masking
Salting
Answer explanation
Salting is the correct answer because it involves adding a random string to a password before hashing to strengthen security. This technique effectively prevents precomputed hash attacks, making it a critical component of modern password protection strategies.
Salting is correct. Read the difference between Salting and Key Stretching on : https://library.mosse-institute.com/articles/2023/07/key-stretching-and-saltingm.html It explains a lot.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technician is deploying a new security camera. Which of the following should the technician do?
Configure the correct VLAN.
Perform a vulnerability scan.
Disable unnecessary ports.
Conduct a site survey.
Answer explanation
D. Conduct a site survey. Before deploying a new security camera, conducting a site survey is crucial. A site survey helps determine the optimal placement of the camera, assesses environmental factors, ensures there are no blind spots, and verifies that the camera will effectively cover the desired area. It also helps in planning for network connectivity, power supply, and other logistical considerations.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is experiencing a web services outage on the public network. The services are up and available but inaccessible. The network logs show a sudden increase in network traffic that is causing the outage. Which of the following attacks is the organization experiencing?
ARP poisoning
Brute force
Buffer overflow
DDoS
Answer explanation
DDoS is the correct answer because the sudden increase in network traffic leading to a web services outage is characteristic of a Distributed Denial of Service attack. This type of attack overwhelms the target's resources, making services inaccessible, even though they are still operational. DDoS attacks specifically aim to disrupt access by flooding the target with excessive traffic, matching the symptoms described in the scenario.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following threat actors is the most likely to be motivated by profit?
Hacktivist
Insider threat
Organized crime
Shadow IT
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
Information and communications technology 101-150

Quiz
•
University
50 questions
UAS BAHASA INDONESIA

Quiz
•
University
50 questions
Chra Exam

Quiz
•
University
53 questions
Management Accounting part A

Quiz
•
University
50 questions
CDL Practice

Quiz
•
University
51 questions
Information and communications technology 151-200

Quiz
•
University
50 questions
NCC Quiz Challenges

Quiz
•
University
45 questions
Module I: Understanding Operating Systems

Quiz
•
12th Grade - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Other
10 questions
Would you rather...

Quiz
•
KG - University
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
10 questions
The Constitution, the Articles, and Federalism Crash Course US History

Interactive video
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
16 questions
Water Modeling Activity

Lesson
•
11th Grade - University
10 questions
ACT English prep

Quiz
•
9th Grade - University