Security+_Domain_4

Security+_Domain_4

Professional Development

30 Qs

quiz-placeholder

Similar activities

Sec+ review

Sec+ review

Security+2

Security+2

CompTIA Review #2

CompTIA Review #2

Chapter 7 Review

Chapter 7 Review

SEC+ Ch.8 Review Test

SEC+ Ch.8 Review Test

Cybersecurity Quiz

Cybersecurity Quiz

Security+_Domain_4

Security+_Domain_4

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Techtorial Academy

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A security analyst is performing a packet capture on a series of SOAP HTTP requests for a security assessment. The analyst redirects the output to a file. After the capture is complete, the analyst needs to review the first transactions quickly and then search the entire series of requests for a particular string. Which of the following would be BEST to use to accomplish this task? (Choose two.)

head

tail

curl

dd

grep

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A systems administrator is troubleshooting a server's connection to an internal web server. The administrator needs to determine the correct ports to use. Which of the following tools BEST shows which ports on the web server are in a listening state?

ipconfig

ssh

ping

netstat

Answer explanation

Netstat

used for troubleshooting and configuration,

show network status and protocol statistics,

displays active TCP connections, ports on which the computer is listening,

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization is concerned that its hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?

hping3 -s comptia.org -p 80

nc -l -v comptia.org -p 80

nmap comptia.org -p 80 -sV

nslookup -port=80 comtia.org

Answer explanation

nmap

network mapping,

vulnerability checking,

port scanning,

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst wants to fingerprint a web server. Which of the following tools will the security analyst MOST likely use to accomplish this task?

nmap -pl-65535 192.168.0.10

curl --head http://192.168.0.10

dig 192.168.0.10

ping 192.168.0.10

Answer explanation

curl

sending a request to get information from a server

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a security assessment, a security analyst finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permissions for the existing users and groups and remove the set-user-ID bit from the file?

ls

chflags

lsof

chmod

setuid

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An IT security manager requests a report on company information that is publicly available. The manager's concern is that malicious actors will be able to access the data without engaging in active reconnaissance. Which of the following is the MOST efficient approach to perform the analysis?

Provide a domain parameter to theHarvester tool.

Check public DNS entries using dnsenum.

Perform a Nessus vulnerability scan targeting a public company’s IP.

Execute nmap using the options: scan all ports and sneaky mode.

Answer explanation

theHarvester

tool for gathering subdomain names, e-mail addresses, virtual hosts, open ports/ banners, and employee names

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee's hard disk. Which of the following should the administrator use?

chmod

dnsenum

dd

logger

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?