Security+

An educational illustration featuring a cybersecurity theme, including elements like firewalls, encryption algorithms, and a digital padlock, with an abstract modern design.

Cybersecurity Knowledge Quiz

Test your knowledge on cybersecurity concepts and practices with our engaging quiz. This quiz features 20 challenging multiple-choice questions that cover a wide range of topics in the field of information security.

Prepare to delve into:

  • Network Security
  • Threat Mitigation Strategies
  • Authentication Protocols
  • Data Protection Techniques
20 Questions5 MinutesCreated by DefendingData123
Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?
The document is a honeyfile and is meant to attract the attention of a cyberintruder
The document is a backup file if the system needs to be recovered
The document is a standard file that the OS needs to verify the login credentials
Cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the company, its facilities, its data, and its staff. Which of the following describes what the manager is doing?
Developing an incident response plan
Conducting a tabletop exercise
Running a simulation exercise
A company has drafted an insider-threat policy that prohibits the use of external storage devices. Which of the following would BEST protect the company from data exfiltration via removable media?
Blocking removable-media devices and write capabilities using a host-based security tool
Developing mandatory training to educate employees about the removable media policy
Monitoring large data transfer transactions in the firewall logs
Which of the following is the router experiencing?
Buffer overflow
Memory leak
Resource exhaustion
A systems administrator wants to implement a wireless protocol that will allow the organization to authenticate mobile devices prior to providing the user with a captive portal login. Which of the following should the systems administrator configure?
WPA2-CCMP with PSK
EAP-TTLS
RADIUS federation
An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol. Which of the following configurations should the instructor implement?
WPA2
WEP
WPA
Which of the following is the BEST way for home users to mitigate vulnerabilities associated with IoT devices on their home networks?
Apply firmware and software updates upon availability
Deploy a bastion host on the home network
Prevent IoT devices from contacting the Internet directly
Subsequently, the systems administrator has also confirmed the user is a member of the finaid group on the ERP system. Which of the following is the MOST likely reason for the issue?
The permissions on the finaid directory should be drwxrwxrwx
The problem is local to the user, and the user should reboot the machine
The permissions on the finaid directory should be d—rwx—
While monitoring the SIEM, a security analyst observes traffic from an external IP to an IP address of the business network on port 443. Which of the following protocols would MOST likely cause this traffic?
SSL
HTTPS
TLS
A technician is designing a solution that will be required to process sensitive information, including classified government data. The system needs to be common criteria certified. Which of the following should the technician select?
Hybrid cloud solution
Trusted operating system
Open-source software applications
A company has just experienced a malware attack affecting a large number of desktop users. The antivirus solution was not able to block the malware, but the HIDS alerted to C2 calls as ‘Troj.Generic’. Once the security team found a solution to remove the malware, they were able to remove the malware files successfully, and the HIDS stopped alerting. The next morning, however, the HIDS once again started alerting on the same desktops, and the security team discovered the files were back. Which of the following BEST describes the type of malware infecting this company’s network?
Spyware
Trojan
Rootkit
A hospital has received reports from multiple patients that their PHI was stolen after completing forms on the hospital’s website. Upon investigation, the hospital finds a packet analyzer was used to steal data. Which of the following protocols would prevent this attack from reoccurring?
SFTP
SRTP
HTTPS
Which of the following types of attack is being used when an attacker responds by sending the MAC address of the attacking machine to resolve the MAC to IP address of a valid server?
IP spoofing
ARP poisoning
Evil twin
A technician is auditing network security by connecting a laptop to open hardwired jacks within the facility to verify they cannot connect. Which of the following is being tested?
Layer 3 routing
Secure IMAP
Port security
A company is looking for an all-in-one solution to provide identification, authentication, authorization, and accounting services. Which of the following technologies should the company use?
Diameter
Kerberos
SAML
A network administrator is trying to provide the most resilient hard drive configuration in a server. With five hard drives, which of the following is the MOST fault-tolerant configuration?
RAID 1
RAID 2
RAID 6
RAID 10
A user is unable to obtain an IP address from the corporate DHCP server. Which of the following is MOST likely the cause?
Resource exhaustion
Memory overflow
Improper input handling
Which of the following controls is implemented in lieu of the primary security controls?
Compensating
Corrective
Detective
Which of the following physical security controls is MOST effective when trying to prevent tailgating?
Mantrap
RFID badge
Motion detection
Adhering to a layered security approach, a controlled access facility employs security guards who verify the authorization of all personnel entering the facility. Which of the following terms BEST describes the security control being employed?
Corrective
Administrative
Compensating
{"name":"Security+", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on cybersecurity concepts and practices with our engaging quiz. This quiz features 20 challenging multiple-choice questions that cover a wide range of topics in the field of information security.Prepare to delve into:Network SecurityThreat Mitigation StrategiesAuthentication ProtocolsData Protection Techniques","img":"https:/images/course4.png"}
Powered by: Quiz Maker