D430 Scenario Based Question Practice
An organization wants to Access controls 3 multiple choice
ensure that only authorized options
personnel can access sensitive
data stored in a database.
What security measure
should be implemented for
protecting data at rest?
A company wishes to secure Virtual Private Network (VPN) 3 multiple choice
communication between its options
two branch offices over the
internet. What technology
should be employed for
protecting data in motion?
A web application needs to Application-level encryption 3 multiple choice
identify and prevent SQL options
injection attacks. What security
measure is most appropriate
for protecting data in use?
An organization wants to Network Segmentation 3 multiple choice
prevent unauthorized access options
to its internal network from
external sources. What
,security measure should be
implemented?
A company aims to detect and Intrusion Detection System (IDS) 3 multiple choice
respond to potential security options
incidents on its network. What
technology is specifically
designed for this purpose?
A security analyst is Nmap 3 multiple choice
conducting a vulnerability options
assessment on a network.
What tool is commonly used
to identify open ports on a
system?
, A company wants to ensure SSL/TLS encryption 3 multiple choice
that employees' login options
credentials are securely
transmitted over the internet.
What technology should be
used for this purpose?
An organization uses a Packet Sniffer 3 multiple choice
security tool that captures options
and analyzes network traffic
in real-time. What type of
tool is being described?
A system administrator is Account Lockouts 3 multiple choice
implementing measures to options
prevent brute force attacks on
user accounts. What security
measure is most effective
for this purpose?
A company wants to allow Virtual Private Network (VPN) 3 multiple choice
employees to securely access options
internal resources from
remote locations. What
technology provides a
secure method for this?
An organization wishes to Proxy Servers 3 multiple choice
monitor and control the options
websites that employees can
access. What technology
is commonly used for this
An organization wants to Access controls 3 multiple choice
ensure that only authorized options
personnel can access sensitive
data stored in a database.
What security measure
should be implemented for
protecting data at rest?
A company wishes to secure Virtual Private Network (VPN) 3 multiple choice
communication between its options
two branch offices over the
internet. What technology
should be employed for
protecting data in motion?
A web application needs to Application-level encryption 3 multiple choice
identify and prevent SQL options
injection attacks. What security
measure is most appropriate
for protecting data in use?
An organization wants to Network Segmentation 3 multiple choice
prevent unauthorized access options
to its internal network from
external sources. What
,security measure should be
implemented?
A company aims to detect and Intrusion Detection System (IDS) 3 multiple choice
respond to potential security options
incidents on its network. What
technology is specifically
designed for this purpose?
A security analyst is Nmap 3 multiple choice
conducting a vulnerability options
assessment on a network.
What tool is commonly used
to identify open ports on a
system?
, A company wants to ensure SSL/TLS encryption 3 multiple choice
that employees' login options
credentials are securely
transmitted over the internet.
What technology should be
used for this purpose?
An organization uses a Packet Sniffer 3 multiple choice
security tool that captures options
and analyzes network traffic
in real-time. What type of
tool is being described?
A system administrator is Account Lockouts 3 multiple choice
implementing measures to options
prevent brute force attacks on
user accounts. What security
measure is most effective
for this purpose?
A company wants to allow Virtual Private Network (VPN) 3 multiple choice
employees to securely access options
internal resources from
remote locations. What
technology provides a
secure method for this?
An organization wishes to Proxy Servers 3 multiple choice
monitor and control the options
websites that employees can
access. What technology
is commonly used for this