Search Header Logo

Security+ Final

Authored by Cyber Professor - Mr. B

Professional Development

Professional Development

Security+ Final
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

1. What type of system monitors the contents of workstations and servers to make sure that key content is not deleted or removed?

SPOF

SLA

DLP

RAID

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

2. A network-based attack that allows the attacker to take full control of a vulnerable host is known as a ________________.

Logic bomb

Keylogger

Trojan

Remote exploit

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

3. Which of the following best describes a "host" as used when discussing TCP/IP networks?

any computer or device that provides services to another device on the network

any computer or device that requests services from another device on the network

any computer or device with an IP address on a TCP/IP network

any computer or device that provides IP addressing information to another device on the network

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

4. Dymond works at First Financial Bank and Trust as a bank teller. While he has the ability to help customers to make deposits and withdrawals from their accounts at the bank, he does not have the ability to sign Cashiers checks or approve balance transfers.


Dymond's inability to have full access to all transactions affecting customer accounts would be one example of a risk management practice. Which practice, from those listed below, is it?

Job rotation

Least privilege

Separation of duties

Background checks

5.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

5. Derrick, a security analyst, is reviewing the following output from an IPS: Given this output, which of the following can be concluded? SELECT TWO


[**] [10:0331:2] EXPLOIT Extracting malformed.cab file attempt [**]

[Classification: Buffer Overflow Attempt] [Priority 1]

04/01-22:31:15.17745 192.168.56.101 - 192.168.56.102

IGMP TTL:255 TOS: 0x0 IS:9742 IpLen:20 DgmLen: 502 MP

Frag Offset: 0x1FFF Frag Size: 0x01E2

[Xref - http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5345]

The source IP of the attack is coming from 192.168.56.101

The attacker sent a malformed .cab file, triggering the alert

The attacker attempted to extract a malformed .cab file, triggering the alert

The source IP of the attack is coming from 192.168.56.102

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

6. Edward, an analyst uses a vulnerability scanner to look for common security misconfigurations on devices. Which of the following might be identified by the scanner? CHOOSE TWO.

The firewall is disabled on workstations

Browser homepages have not been customized

The OS is only set to check for updates once a day

SSH is enabled on servers

Default administrator credentials exist on network hardware

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

7. _____________ are the first line of defense for networks connected to the Internet.

Bridges

Gateways

Firewalls

Routers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development