Quiz - Secure Data and Applications - Attempt Review
Quiz - Secure Data and Applications - Attempt Review
0 Self-Paced
Started on Sunday, March 24, 2024, 9:02 PM
State Finished
Completed on Sunday, March 24, 2024, 9:12 PM
Time taken 9 mins 54 secs
Points 10/10
Grade 100 out of 100
Feedback Congratulations, you passed!
Question 1
Correct
1 points out of 1
Which product should a security architect use first to prevent zero-day attacks?
Select one:
Network access control (NAC)
Sandbox
Firewall
Web application firewall (WAF)
Question 2
Correct
1 points out of 1
A security engineer would like to create a browsing group policy for application hardening. Which two features should the policy include?
(Choose two.)
Correct
1 points out of 1
A security engineer must manage the devices of a large company. Which measures should they implement as part of application hardening?
Select one:
Access only through virtual private networks (VPNs)
A switch audit
An underlay network
A patch management system
Question 4
Correct
1 points out of 1
Which two recommendations should you make to a chief security officer in order to block phishing attempts and their effects? (Choose two.)
Question 5
Correct
1 points out of 1
Which two security features are included only in the latest generation WAF? (Choose two.)
1 points out of 1
Question 7
Correct
1 points out of 1
Which two tasks should a security engineer perform to protect private data for an organization? (Choose two.)
Question 8
Correct
1 points out of 1
Which component should a company implement to secure sensitive data in their internal servers?
Select one:
Virtual private network (VPN)
Real-time blackhole list (RBL)
Web application firewall (WAF)
Data loss prevention (DLP)
Question 9
Correct
1 points out of 1
Which factors should a security engineer verify to ensure an organization’s data comply with data sovereignty laws and policies?
Select one:
The audit performed on data at rest.
The risks involved in data destruction.
The laws of the nation where the data are collected.
The compliance of the organization’s in-use data.
Question 10
Correct
1 points out of 1
A chief security officer would like to prevent ransomware in their organization. Which two techniques should you recommend? (Choose two.)