Time limit: 0
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Test complete. Results are being recorded.
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Question 1 of 20
1. Question
After establishing and documenting your baseline configuration, which step should be implemented?
CorrectIncorrect -
Question 2 of 20
2. Question
What questions might a security analyst ask when analyzing budgeting and costing during an extensive procurement review?
CorrectIncorrect -
Question 3 of 20
3. Question
A recently hired security analyst at a local organization wants to better understand the organization’s network infrastructure. Which of the following activities would provide a list of servers, workstations, printers, switches, and routers currently active in the network?
CorrectIncorrect -
Question 4 of 20
4. Question
A CTO of a medium-sized enterprise noticed that several software applications were not updated regularly, leading to potential security vulnerabilities. Upon investigation, he realized that no specific team or individual was assigned as the owner of these applications. To enhance security, what should the CTO emphasize?
CorrectIncorrect -
Question 5 of 20
5. Question
Which testing methodology can be used to analyze source code to find any security vulnerabilities that make an organization’s applications susceptible to attacks?
CorrectIncorrect -
Question 6 of 20
6. Question
WPA3-Enterprise is a security protocol that requires a minimum encryption standard of 192-bit AES. Which of the following advanced encryption methods is supported by WPA3-Enterprise to provide even more robust data protection? (Choose two.)
CorrectIncorrect -
Question 7 of 20
7. Question
An organization recently adopted a mobile strategy where employees are provided with company-owned devices. These devices are allowed for personal use, but the organization retains the ability to manage and monitor them. Which deployment model is this organization using?
CorrectIncorrect -
Question 8 of 20
8. Question
In which way does mobile device management (MDM) software make it easy for administrators to view inventory control and track assets such as devices and the type of data each device contains?
CorrectIncorrect -
Question 9 of 20
9. Question
You are tasked with deploying wireless access points in a large food packaging factory. After deploying the WAPs, employees report inconsistent wireless connectivity in some areas. Which tool would be most effective for the IT team to visualize areas of weak wireless signal strength?
CorrectIncorrect -
Question 10 of 20
10. Question
You have been tasked with securing a central server that houses patients’ medical records in a local hospital. Which two hardening techniques can encrypt patient data in medical devices? (Choose two.)
CorrectIncorrect -
Question 11 of 20
11. Question
Which of the following is NOT an example of data in use?
CorrectIncorrect -
Question 12 of 20
12. Question
A local power supply company is having problems with continuous power supply. You want to protect a highly available server from short power outages between 5 and 10 minutes. You are considering long-term options that can protect your servers from these outages. Which power management solution should be considered?
CorrectIncorrect -
Question 13 of 20
13. Question
How does continuous data protection (CDP) capture every version of the data at every point in time?
CorrectIncorrect -
Question 14 of 20
14. Question
Your team is considering different types of backup for a large set of critical data. Which of the following can be a drawback of offsite backup?
CorrectIncorrect -
Question 15 of 20
15. Question
How does an operations manager facilitate constructive feedback during a security incident response simulation (SIRS)?
CorrectIncorrect -
Question 16 of 20
16. Question
A natural disaster has struck a data center that houses critical servers for a healthcare institution. How can a manager ensure the first incident response team is prepared to assess the immediate damage to the physical infrastructure and cyber assets? (Choose two.)
CorrectIncorrect -
Question 17 of 20
17. Question
You are building computer systems for a research company that requires multiple systems for complex calculations. Which mechanism should be used to distribute workload across multiple computers to speed up computational tasks?
CorrectIncorrect -
Question 18 of 20
18. Question
Which high-availability component enables web servers hosting high-traffic sites to run optimally without interruptions in case of hardware or network failure?
CorrectIncorrect -
Question 19 of 20
19. Question
You are looking at different hashes that verify a password’s integrity. Which hashing algorithm type is used for the following hash:
D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2
CorrectIncorrect -
Question 20 of 20
20. Question
You’re subscribed to a famous online video streaming service. You travel to an Asian country for vacation. When you try to access the streaming service, it fails to load the content. Searching for answers online, you find out that the streaming service doesn’t offer any content in that country. Which security restrictions are used in this scenario?
CorrectIncorrect
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Correct
- Incorrect