Security Plus 10q Part 2

A digital illustration showing a diverse group of cybersecurity professionals engaging with computers and technology, with elements like firewalls, data protection symbols, and a secure network theme in a modern office setting.

Security Plus Quiz

Test your knowledge with our comprehensive Security Plus quiz designed for professionals and enthusiasts alike. Challenge yourself with questions covering critical topics in cybersecurity.

  • 10 multiple choice questions
  • Gain insights into security best practices
  • Prepare for certification and enhance your skills
10 Questions2 MinutesCreated by SecureGuard24
Employee's hard disk. Which of the following should the administrator use?
A. dd
B. chmod
C. dnsenum
D. logger
Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?
Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?
B. PCI DSS
C. GDPR
D. ISO 31000
Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?
A. Investigation
B. Containment
C. Recovery
D. Lessons learned
A security auditor is reviewing vulnerability scan data provided by an internal security team. Which of the following BEST indicates that valid credentials were used?
A. The scan results show open ports, protocols, and services exposed on the target host
B. The scan enumerated software versions of installed programs
C. The scan produced a list of vulnerabilities on the target host
D. The scan identified expired SSL certificates
Which of the following BEST explains the difference between a data owner and a data custodian?
A. The data owner is responsible for adhering to the rules for using the data, while the data custodian is responsible for determining the corporate governance regarding the data
B. The data owner is responsible for determining how the data may be used, while the data custodian is responsible for implementing the protection to the data
C. The data owner is responsible for controlling the data, while the data custodian is responsible for maintaining the chain of custody when handling the data
D. The data owner grants the technical permissions for data access, while the data custodian maintains the database access controls to the data
A network engineer needs to build a solution that will allow guests at the company's headquarters to access the Internet via WiFi. This solution should not allow access to the internal corporate network, but it should require guests to sign off on the acceptable use policy before accessing the Internet. Which of the following should the engineer employ to meet these requirements?
A. Implement open PSK on the APs
B. Deploy a WAF
C. Configure WIPS on the APs
D. Install a captive portal
A. Credential harvesting
B. Keylogger
C. Brute-force
D. Spraying
Which of the following cloud models provides clients with servers, storage, and networks but nothing else?
A. SaaS
B. PaaS
C. IaaS
D. DaaS
A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.)
A. Dual power supply
B. Off-site backups
C. Automatic OS upgrades
D. NIC teaming
E. Scheduled penetration testing
F. Network-attached storage
A. MAC cloning
B. Evil twin
C. Man-in-the-middle
D. ARP poisoning
{"name":"Security Plus 10q Part 2", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge with our comprehensive Security Plus quiz designed for professionals and enthusiasts alike. Challenge yourself with questions covering critical topics in cybersecurity.10 multiple choice questionsGain insights into security best practicesPrepare for certification and enhance your skills","img":"https:/images/course1.png"}
Powered by: Quiz Maker