Time limit: 0
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Test complete. Results are being recorded.
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Question 1 of 20
1. Question
Which two hardening techniques secure a host system by monitoring incoming and outgoing traffic, providing real-time protection against known and unknown threats, and monitoring the host system’s behavior? (Choose two.)
CorrectIncorrect -
Question 2 of 20
2. Question
An organization wants to secure all the devices connected to its network, including printers, scanners, laptops, and smartphones. Which security implementation possesses anti-virus, anti-malware, and other security solutions to protect devices connected to the network?
CorrectIncorrect -
Question 3 of 20
3. Question
What are the responsibilities of an IaaS cloud service provider according to the responsibility matrix?
CorrectIncorrect -
Question 4 of 20
4. Question
A program analyst wants to configure applications in a micro-segmentation environment where the users or applications cannot talk to other applications without a defined set of policies. Which configuration model is suitable in this situation?
CorrectIncorrect -
Question 5 of 20
5. Question
How can logical segmentation divide the internal network into different VLANs for multiple departments?
CorrectIncorrect -
Question 6 of 20
6. Question
There are three container images: A, B, and C. Container image B is forked from container image A. Python version 3 is added to container image B. Container image C is built on container image B. Which entities should be added to container image C so that it can have security and a web server?
CorrectIncorrect -
Question 7 of 20
7. Question
In a SCADA architecture, which microcomputers communicate with an array of objects such as turbines, machines, gauges, sensors, and end devices and then route the information from those objects to the SCADA computers?
CorrectIncorrect -
Question 8 of 20
8. Question
Which software component rapidly switches between tasks, giving the impression that multiple programs are being executed simultaneously on a single processing core?
CorrectIncorrect -
Question 9 of 20
9. Question
An organization wants to implement load balancing for the web server. They want the web servers to work simultaneously sharing the load. Both the systems will run the same configuration. Which infrastructure consideration should be implemented for this scenario?
CorrectIncorrect -
Question 10 of 20
10. Question
Which type of proxy secures a network by keeping the machine anonymous through NAT?
CorrectIncorrect -
Question 11 of 20
11. Question
The 802.1X authentication procedure has four steps. In which step does the authentication server send a reply to the authenticator by specifying the EAP method?
CorrectIncorrect -
Question 12 of 20
12. Question
Which packet filtering type in a firewall keeps track of the state of the network connections by examining the header in each packet?
CorrectIncorrect -
Question 13 of 20
13. Question
You are configuring a failsafe Remote Access Service (RAS) server that uses a dial-up connection to control the network equipment in case the fiber optic connections fail. Which RAS authentication should be used to secure the RAS server?
CorrectIncorrect -
Question 14 of 20
14. Question
Which attributes are exchanged in the IKEv1 phase 1 negotiation while configuring the IPsec protocol to establish site-to-site or remote access VPN tunnels?
CorrectIncorrect -
Question 15 of 20
15. Question
How does Secure Access Service Edge (SASE) support an organization’s dynamic security needs by integrating network and security services into a single unified platform, providing seamless access to resources irrespective of where users are located?
CorrectIncorrect -
Question 16 of 20
16. Question
Which failure mode configuration should be used when a database server has confidential information, and you want to stop the database server from servicing requests altogether in case of server failure?
CorrectIncorrect -
Question 17 of 20
17. Question
Which compliance regulations in the United States govern and control the integrity and confidentiality of financial data? (Choose two.)
CorrectIncorrect -
Question 18 of 20
18. Question
Unauthorized access to which type of classified data can cause grave damage to an organization?
CorrectIncorrect -
Question 19 of 20
19. Question
Which of the following restricted data types has an extra layer of security because an unauthorized disclosure could result in severe legal consequences, amounting to a significant financial loss and a tarnished reputation?
CorrectIncorrect -
Question 20 of 20
20. Question
You have a large amount of data stored on external drives. To mitigate the risk of data theft, you want to secure it with strong encryption algorithms. In which state does this data exist?
CorrectIncorrect
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Correct
- Incorrect