Set1 test3
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Which aspect of security alerting and monitoring is focused on ensuring that specific software solutions, such as databases or CRM tools, are functioning securely and are not compromised by external threats? | show ๐
|
||||
show | Fail-open
๐
|
||||
Which of the following network technologies separates the control plane from the data plane, allowing for more flexibility and automation in network management? | show ๐
|
||||
show | Asset Inventory Manager
๐
|
||||
show | IDS/IPS
๐
|
||||
show | Logic Bomb
๐
|
||||
The company's new solution allows employees to log in using their face or fingerprint. What passwordless approach has LunarSoft incorporated? | show ๐
|
||||
show | KEYLOGGER
๐
|
||||
show | Encountering a software dependency
๐
|
||||
show | Process Flow
๐
|
||||
show | Asymmetric encryption
๐
|
||||
show | Execution
๐
|
||||
show | Data masking
๐
|
||||
show | Verification of compliance with internal security audits
๐
|
||||
Before implementing a change in the organization's critical infrastructure, it's essential to ensure the proposed modification is assessed, reviewed, and authorized. Which process ensures that these steps are followed? | show ๐
|
||||
You want to use a mitigation technique that can help you protect systems from various attacks by installing software that can provide antivirus, firewall, anti-malware.Which of the following mitigation techniques can help you achieve this goal? | show ๐
|
||||
They need a document that provides detailed instructions and requirements for the software development project that will include features the software should have, when the work must finished, and other essential details. | show ๐
|
||||
show | pulverizing with industrial machinery
๐
|
||||
Which of the following provides short-term emergency power to a device when the input power source fails, allowing for either proper system shutdown or switching to a long-term power source? | show ๐
|
||||
show | SQL Injection
Structured query language injection
๐
|
||||
Which of the following statements is NOT true about the importance of continuous integration in relation to secure operations? | show ๐
|
||||
Which of the following statements BEST explains the Acquisition as part of the incident response activities? | show ๐
|
||||
Dion Training is concerned with protecting data in as it moves from Dion's computers to its cloud servers. Which of the following BEST describes the primary method to secure data when it is being transmitted over a network? | show ๐
|
||||
show | Security information and event management
๐
|
||||
Which of the following statements BEST explains the importance of the workforce multiplier? | show ๐
|
||||
show | Journaling is a form of backup that involves recording all transactions in a system which can be used to restore the system to a previous state.
๐
|
||||
show | Security Zones
๐
|
||||
show | Blackmail
๐
|
||||
show | Data Owner
๐
|
||||
show | A caller posing as tech support to to obtain passwords
๐
|
||||
Which of the following is MOST indicative of a voice call threat? | show ๐
|
||||
show | Privlidge Escalation
๐
|
||||
you have discovered that the company is currently utilizing a deprecated encryption protocol that poses a significant security threat. Which of the following is the MOST appropriate encryption protocol? | show ๐
|
||||
show | Implementing Content Categorization
๐
|
||||
show | Enables consistent security standards during scaling
๐
|
||||
show | Likelihood
๐
|
||||
show | Fines
๐
|
||||
Which of the following objectives is primarily fulfilled by using questionnaires during vendor assessments? | show ๐
|
||||
show | script kiddie, unskilled attacker
๐
|
||||
To ensure that critical encryption keys are available for recovery in case of emergencies, Kelly Innovations LLC has stored a copy of these keys with a trusted third party. Which cryptographic solution is Kelly Innovations LLC using? | show ๐
|
||||
Which of the following is a type of security incident that involves unauthorized disclosure of sensitive data due to INSECURE SETTINGS IN SYSTEMS? | show ๐
|
||||
show | Somewhere you are
๐
|
||||
show | impossible travel
๐
|
||||
show | 80,21
๐
|
||||
show | Manages and updates security policies for access control
๐
|
||||
Which of the following statements BEST explains the importance of E-discovery in incident response? | show ๐
|
||||
show | fail-closed
๐
|
||||
show | Data retention implies storing all data indefinitely as it might be needed at some point
๐
|
||||
Which of the following statements BEST explains the function of an Exposure Factor in the context of vulnerability management? | show ๐
|
||||
What type of the threat actor is motivated by beliefs about politics and often targets organizations they disagree with? | show ๐
|
||||
Which of the following terms is used to describe a situation where a security system or tool incorrectly flags an action or event as malicious or harmful, even though it's actually benign? | show ๐
|
||||
Which of the following terms BEST describes the measurement used to describe a 7% possibility of hardware failure in the next year based on past statistical data? | show ๐
|
||||
Kelly Innovations LLC is seeking a solution to encrypt a virtual disk drive that contains archived financial data without encrypting the entire physical disk. Which encryption level would be BEST for this requirement? | show ๐
|
||||
show | Quantatative
๐
|
||||
Which of the following terms refers to entities that establish and enforce security standards, regulations, and guidelines across specific sectors such as finance and healthcare? | show ๐
|
||||
show | enforces security controls for the safe transport and storage of data
๐
|
||||
show | COMPUTE
๐
|
||||
show | Computer security act of 1987
๐
|
||||
Dion Training Solutions has partnered with several smaller companies. They set up a system allowing employees from any company to access resources from another partner company without requiring a separate username and password. This is an example of: | show ๐
|
||||
show | VPN
๐
|
||||
Given that cloud architecture provides dynamic resource allocation, which of the following security considerations is MOST critical when dealing with the compute component? | show ๐
|
||||
They have always converted passwords to fixed length sequences, but now they will do this process more than once to increase the amount of computing power and time it will take for an attacker to decode the password. What is this method known as? | show ๐
|
||||
His bosswants to purchase a storage device to save symmetric and asymmetric keys. Royston has explained that the Windows-based devices they use have this type of storage embedded in the motherboards. What is the name of the device | show ๐
|
||||
Upon investigation, it is discovered that an attacker was able to exploit a vulnerability in the encryption used to protect data in transit. Which of the following is the MOST likely cause of this issue? | show ๐
|
||||
show | EDR provides behavorial analysis and threat detection to detect and respond to cyber threats
๐
|
||||
show | Allow List
๐
|
||||
show | TLS
๐
|
||||
show | to asses physical , software, and network layers
๐
|
||||
show | zero day
๐
|
||||
show | CVE
๐
|
||||
Which of the following cryptographic techniques uses the same key for both encryption and decryption processes, making it essential that the key remains secret and is shared securely among the involved parties? | show ๐
|
||||
Which of the following statements BEST explains the importance of considering single points of failure? | show ๐
|
||||
When aiming to limit access between different parts of a network to reduce the potential impact of compromised systems, which activity is MOST directly applied? | show ๐
|
||||
show | crypto ransom malware
๐
|
||||
Dion Training is planning to expand its online services, including launching multiple subdomains for different courses. They want a single certificate that can secure all these subdomains. Which type of certificate should Dion Training consider? | show ๐
|
||||
show | Physical Isolation
๐
|
||||
show | SFTP provides secure data transfer, end-to-end encryption.
๐
|
||||
show | Vishing
๐
|
||||
show | Ransomware
๐
|
||||
Which of the following best describes a governance model where decision-making authority is restricted to a few individuals at the top of the organizational hierarchy? | show ๐
|
||||
show | S/MIME
๐
|
||||
show | Zero-Day
๐
|
||||
The market has a high risk, high reward profile, but it will be difficult to break into the current market. Henry suggests that they wait and see if the market changes and becomes easier to enter. Which risk strategy is Henry using? | show ๐
|
||||
An organization has recently decided to utilize multiple operating systems and applications on a single physical server to optimize resource usage and reduce costs. Which of the following BEST represents this approach? | show ๐
|
||||
show | Instruct users to create strong, unique passwords fr each account
๐
|
||||
Which of the following terms specifically represents the target duration for recovering IT and business operations after a disruptive event? | show ๐
|
||||
show | Root cause analysis helps to understand how the incident occurred and how to prevent it from occuring
๐
|
||||
show | Access to the original file is denied by the user q
๐
|
||||
show | Gap analysis
๐
|
||||
show | The ensure compliance with legal and regulatory
๐
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
Studyingsux