Search Header Logo

Security+_Domain_4

Authored by Techtorial Academy

Computers

Professional Development

Used 6+ times

Security+_Domain_4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A security analyst is performing a packet capture on a series of SOAP HTTP requests for a security assessment. The analyst redirects the output to a file. After the capture is complete, the analyst needs to review the first transactions quickly and then search the entire series of requests for a particular string. Which of the following would be BEST to use to accomplish this task? (Choose two.)

head

tail

curl

dd

grep

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A systems administrator is troubleshooting a server's connection to an internal web server. The administrator needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?

ipconfig

ssh

ping

netstat

Answer explanation

Netstat

•used for troubleshooting and configuration,

•show network status and protocol statistics,

•displays active TCP connections, ports on which the computer is listening,

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization is concerned that its hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?

hping3 -s comptia.org -p 80

nc -l -v comptia.org -p 80

nmap comptia.org -p 80 -sV

nslookup -port=80 comtia.org

Answer explanation

nmap

•network mapping,

•vulnerability checking,

•port scanning,

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst wants to fingerprint a web server. Which of the following tools will the security analyst MOST likely use to accomplish this task?

nmap -pl-65535 192.168.0.10

curl --head http://192.168.0.10

dig 192.168.0.10

ping 192.168.0.10

Answer explanation

curl

sending a request to get information from a server

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a security assessment, a security analyst finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permissions for the existing users and groups and remove the set-user-ID bit from the file?

ls

chflags

lsof

chmod

setuid

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An IT security manager requests a report on company information that is publicly available. The manager's concern is that malicious actors will be able to access the data without engaging in active reconnaissance. Which of the following is the MOST efficient approach to perform the analysis?

Provide a domain parameter to theHarvester tool.

Check public DNS entries using dnsenum.

Perform a Nessus vulnerability scan targeting a public company’s IP.

Execute nmap using the options: scan all ports and sneaky mode.

Answer explanation

theHarvester

tool for gathering subdomain names, e-mail addresses, virtual hosts, open ports/ banners, and employee names

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee's hard disk. Which of the following should the administrator use?

chmod

dnsenum

dd

logger

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?