Security+ - 03

Security+ - 03

11th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Infrastructure Architects and Network administrators Quiz

Infrastructure Architects and Network administrators Quiz

11th Grade - Professional Development

18 Qs

Database Security Controls II

Database Security Controls II

11th Grade

20 Qs

B.2.2 Practice Test

B.2.2 Practice Test

9th - 12th Grade

20 Qs

MTA Networking Fundamentals: Lesson 1

MTA Networking Fundamentals: Lesson 1

11th Grade - University

16 Qs

security best practices

security best practices

10th Grade - University

20 Qs

CIW

CIW

9th - 12th Grade

15 Qs

Quiz1_12&11_2t_20214

Quiz1_12&11_2t_20214

12th Grade

20 Qs

client server

client server

10th - 11th Grade

21 Qs

Security+ - 03

Security+ - 03

Assessment

Quiz

Instructional Technology, Computers

11th - 12th Grade

Hard

Created by

Ananda Dwi

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened?

A malicious USB was introduced by an unsuspecting employee.

The ICS firmware was outdated

A local machine had a RAT installed

The HVAC was connected to the maintenance vendor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious actor recently penetrated a company's network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know what was in the memory on the compromised server. Which of the following files should be given to the forensics firm?

Security

Application

Dump

Syslog

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst receives the configuration of a current VPN profile and notices the authentication is only applied to the IP datagram portion of the packet. Which of the following should the analyst implement to authenticate the entire packet?

AH

ESP

SRTP

LDAP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The security administrator isolated the switch on a separate VLAN and set up a patching routine. Which of the following steps should also be taken to harden the smart switch?

Set up an air gap for the switch,

Change the default password for the switch.

Place the switch in a Faraday cage.

Install a cable lock on the switch

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site. upon investigation, a security analyst identifies the following:

1. The legitimate website's IP address is 10.1.1.20 and resolves to this IP.

2. The forged website's IP address appears to be 10.2.12.99, based on NetFlow records.

3. All three to the organization's DNS servers show the website correctly resolves to the legitimate IP.

4. DNS query logs show one of the three DNS servers returned a result of 10.2.12.99 (cached) at the approximate time of the suspected compromise.


Which of the following MOST likely occurred?

A reverse proxy was used to redirect network traffic.

An SSL strip MITM attack was performed

An attacker temporarily poisoned a name server.

An ARP poisoning attack was successfully executed.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the real data?

Data encryption

Data masking

Data deduplication

Data minimization

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator needs to create a RAID configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drives will fail simultaneously. Which of the following RAID configurations should the administrator use?

RAID 0

RAID 1

RAID 5

RAID 10

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?