Security Plus

Create an image depicting a cybersecurity professional analyzing data on multiple screens, surrounded by security icons like locks, shields, and warning signs.

Security Plus Quiz

Test your knowledge of security principles and practices with our comprehensive Security Plus Quiz. This quiz features 19 questions that cover a range of topics to help you assess your understanding of security concepts.

Key features:

  • Multiple choice questions
  • Relevant scenarios
  • Instant feedback on answers
19 Questions5 MinutesCreated by ProtectingMind237
A user has attempted to access data at a higher classification level than the user’s account is currently authorized to access. Which of the following access control models has been applied to this user’s account?
MAC
DAC
RBAC
ABAC
A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented in the administrator does not want to provide the wireless password or he certificate to the employees?
WPS
802.1x
WPA2-PSK
TKIP
When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?
DES
AES
MD5
WPA2-PSK
A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
Deterrent
Preventive
Detective
Compensating
Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including: - Slow performance - Word documents, PDFs, and images no longer opening - A pop-up Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?
Spyware
Crypto-Malware
Rootkit
Backdoor
An organization wishes to provide better security for its name resolution services. Which of the following technologies BEST supports the deployment of DNSSEC at the organization?
LDAP
TPM
TLS
SSL
PKI
A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?
LDAP services
Kerberos services
NTLM services
CHAP service
A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types of malware is MOST likely causing this issue?
Botnet
Ransomware
Polymorphic Malware
Armored Virus
When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:
System Sprawl
End-of-life System
Resource Exhaustion
A Default Configuration
In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?
Using Salt
Using Hash Algorithms
Implementing Elliptical Curve
Implementing PKI
When considering a third-party cloud service provider, which of the following criteria would be the BEST to include in the security assessment process? (Select two.)
Use of performance analytics
Adherence to regulatory compliance
Data Retention Policies
Size of Corporation
Breadth of application support
Which of the following occurs when the security of a web application relies on JavaScript for input validation?
The integrity of the data at risk
The security of the application relies on antivirus
A host-based firewall is required
The application is vulnerable to race conditions
An organization's file server has been virtualized to reduce costs. Which of the following types of backups would be MOST appropriate for the particular file server?
Snapshot
Full
Incremental
Differential
A wireless network uses a RADIUS server that is connected to an authenticator, which in turn connects to a supplicant. Which of the following represents the authentication architecture in use?
Open systems authentication
Captive Portal
RADIUS federation
802.1x
An employer requires that employees use a key-generating app on their smartphones to log into corporate applications. In terms of authentication of an individual, this type of access policy is BEST defined as:
Something you have
Something you know
Something you do
Something you are
A vulnerability scanner that uses its running service’s access level to better assess vulnerabilities across multiple assets within an organization is performing a:
Credentialed Scan
Non-intrusive scan
Privilege escalation test
Passive scan
A new firewall has been places into service at an organization. However, a configuration has not been entered on the firewall. Employees on the network segment covered by the new firewall report they are unable to access the network. Which of the following steps should be completed to BEST resolve the issue?
The firewall should be configured to prevent user traffic form matching the implicit deny rule.
The firewall should be configured with access lists to allow inbound and outbound traffic.
The firewall should be configured with port security to allow traffic.
The firewall should be configured to include an explicit deny rule
As part of the SDLC, a third party is hired to perform a penetration test. The third party will have access to the source code, integration tests, and network diagrams. Which of the following BEST describes the assessment being performed?
Black Box
Regression
White Box
Fuzzing
After an identified security breach, an analyst is tasked to initiate the IR process. Which of the following is the NEXT step the analyst should take?
Recovery
Identification
Preparation
Documentation
Escalation
{"name":"Security Plus", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of security principles and practices with our comprehensive Security Plus Quiz. This quiz features 19 questions that cover a range of topics to help you assess your understanding of security concepts.Key features:Multiple choice questionsRelevant scenariosInstant feedback on answers","img":"https:/images/course8.png"}
Powered by: Quiz Maker