Security+ - 03

Security+ - 03

11th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

ASJ_XII_UH1

ASJ_XII_UH1

1st - 12th Grade

15 Qs

Python Quiz For Starters

Python Quiz For Starters

3rd Grade - Professional Development

17 Qs

EmTech Q2 Post Test 5

EmTech Q2 Post Test 5

11th Grade

15 Qs

Django-quiz

Django-quiz

5th Grade - University

20 Qs

Arduino_Quiz

Arduino_Quiz

12th Grade

20 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

Digital learning and Teams - etiquette & protocols

Digital learning and Teams - etiquette & protocols

8th - 12th Grade

16 Qs

CPA 3NT Paper 1 Quiz 6 (Ping Yi Sec)

CPA 3NT Paper 1 Quiz 6 (Ping Yi Sec)

10th - 12th Grade

20 Qs

Security+ - 03

Security+ - 03

Assessment

Quiz

Instructional Technology, Computers

11th - 12th Grade

Practice Problem

Hard

Created by

Ananda Dwi

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened?

A malicious USB was introduced by an unsuspecting employee.

The ICS firmware was outdated

A local machine had a RAT installed

The HVAC was connected to the maintenance vendor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious actor recently penetrated a company's network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know what was in the memory on the compromised server. Which of the following files should be given to the forensics firm?

Security

Application

Dump

Syslog

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst receives the configuration of a current VPN profile and notices the authentication is only applied to the IP datagram portion of the packet. Which of the following should the analyst implement to authenticate the entire packet?

AH

ESP

SRTP

LDAP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The security administrator isolated the switch on a separate VLAN and set up a patching routine. Which of the following steps should also be taken to harden the smart switch?

Set up an air gap for the switch,

Change the default password for the switch.

Place the switch in a Faraday cage.

Install a cable lock on the switch

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site. upon investigation, a security analyst identifies the following:

1. The legitimate website's IP address is 10.1.1.20 and resolves to this IP.

2. The forged website's IP address appears to be 10.2.12.99, based on NetFlow records.

3. All three to the organization's DNS servers show the website correctly resolves to the legitimate IP.

4. DNS query logs show one of the three DNS servers returned a result of 10.2.12.99 (cached) at the approximate time of the suspected compromise.


Which of the following MOST likely occurred?

A reverse proxy was used to redirect network traffic.

An SSL strip MITM attack was performed

An attacker temporarily poisoned a name server.

An ARP poisoning attack was successfully executed.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the real data?

Data encryption

Data masking

Data deduplication

Data minimization

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator needs to create a RAID configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drives will fail simultaneously. Which of the following RAID configurations should the administrator use?

RAID 0

RAID 1

RAID 5

RAID 10

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology