Sec + CH.2 Pre-Assessment

Sec + CH.2 Pre-Assessment

Professional Development

8 Qs

quiz-placeholder

Similar activities

Security+ Lesson 8

Security+ Lesson 8

Professional Development

10 Qs

How are you doing?

How are you doing?

Professional Development

10 Qs

Securing Source Code

Securing Source Code

Professional Development

10 Qs

ITF - Quiz 13.1 - Securing Devices

ITF - Quiz 13.1 - Securing Devices

Professional Development

12 Qs

CIW IBA Lesson 4 Vocabulary

CIW IBA Lesson 4 Vocabulary

8th Grade - Professional Development

11 Qs

Network - Test 4

Network - Test 4

Professional Development

7 Qs

DBMS DEFINITIONS

DBMS DEFINITIONS

Professional Development

10 Qs

Section A - 7 -  Computer Software - Types & Roles of Operat

Section A - 7 - Computer Software - Types & Roles of Operat

Professional Development

10 Qs

Sec + CH.2 Pre-Assessment

Sec + CH.2 Pre-Assessment

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Prem Jadhwani

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are comparing different types of authentication. Of the following

choices, which one uses multifactor authentication?

A system that requires users to enter a username and password

A system that checks an employee’s fingerprint and does a vein

scan

A cipher door lock that requires employees to enter a code to open

the door

A system that requires users to have a smart card and a PIN

Answer explanation

D is correct. A system that requires users to have a smart card and a

personal identification number (PIN) uses multifactor authentication or

two-factor authentication. The card is in the something you have factor, and

the PIN is in the something you know factor. A username provides

identification, and a password is in the something you know factor,

providing single-factor authentication. Fingerprints and vein scans are both

in the something you are factor, providing single-factor authentication. A

code for a cipher door lock is in the something you know factor, providing

single-factor authentication. See Chapter 2.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The chief information officer (CIO) at your organization suspects

someone is entering the data center after normal working hours and stealing

sensitive data. Which of the following actions can prevent this?

Upgrade the CCTV system.

Require smart cards to enter the data center.

Implement time-based logins.

Enable advanced auditing.

Answer explanation

C is correct. Time-based logins (sometimes called time-of-day

restrictions) would prevent this. They would prevent anyone from logging

in after normal working hours and accessing sensitive data. All of the other

answers can detect suspicious behavior, but they wouldn’t prevent the users

from logging in after normal working hours and stealing the data. See

Chapter 2.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A SQL database server was recently attacked. Cybersecurity

investigators discovered the attack was self-propagating through the

network. When it found the database server, it used well-known credentials

to access the database. Which of the following would be the BEST action to

prevent this from occurring again?

Change the default application password.

This describes a worm.

Implement 2FA.

Conduct a code review.

Answer explanation

A is correct. The default application password for the SQL server

should be changed. Some SQL Server software implementations can have a

default blank password for the SA account (the System Administrator

account), and these default credentials are well-known. While the scenario

describes a worm because it is self-propagating, the question is asking for

the best preventive action to take. Using two-factor authentication (2FA) is

a good practice for users, but it isn’t always feasible for application

passwords. A code review can detect flaws and vulnerabilities in internally

developed applications, but SQL Server is Microsoft software. See Chapter

2.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You are reviewing security controls and their usefulness. You notice that

account lockout policies are in place. Which of the following attacks will

these policies thwart? (Select TWO.)

Brute force

DNS poisoning

Dictionary

Replay

Buffer overflow

Answer explanation

A and C are correct. Brute force and dictionary attacks attempt to guess

passwords, but an account lockout control locks an account after the wrong

password is guessed too many times. The other attacks are not password

attacks, so they aren’t mitigated using account lockout controls. Domain

Name System (DNS) poisoning attempts to redirect web browsers to

malicious URLs. Replay attacks attempt to capture packets to impersonate

one of the parties in an online session. Buffer overflow attacks attempt to

overwhelm online applications with unexpected code or data. See Chapters

2 and 10.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IT administrators created a VPN for employees to use while working

from home. The VPN is configured to provide AAA services. Which of the

following would be presented to the AAA system for identification?

Password

Permissions

Username identification

Tunneling certificate

Hardware token

Answer explanation

C is correct. Users would typically enter a username as identification

for an authentication, authorization, and accounting (AAA) system. Users

would provide a password as proof that the claimed identity (the username)

is theirs. The password provides authentication. Users are assigned

permissions based on their proven identity, but the permissions do not

provide authentication. The virtual private network (VPN) would encrypt

traffic sent via the VPN tunnel, and this traffic may be encrypted with the

use of a certificate. However, this is not called a tunneling certificate, and

the certificate used for encryption does not provide identification. A

hardware token is often used as an additional method of authentication, but

it does not provide identification. See Chapter 2.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a recent attack, security investigators discovered that attackers

logged on with an administrator account. They recommend implementing a

solution that will thwart this type of attack in the future. The solution must

support the following requirements:

Allow authorized users to access the administrator account

without knowing the password.

Allow authorized users to check out the credentials when

needed.

Log each time the credentials are used.

Automatically change the password.

Which of the following answers would meet these requirements?

Privileged access management

OpenID Connect

MAC scheme

MFA

Answer explanation

A is correct. A privileged access management system protects and limits

access to privileged accounts such as administrator accounts. OpenID

Connect is used for authentication and authorization on the Internet, not

internal networks. A mandatory access control (MAC) scheme uses labels

to control access, but it isn’t used to control access to administrator

accounts. Multifactor authentication (MFA) uses more than one factor of

authentication, but it doesn’t meet any of the requirements of this scenario.

See Chapter 2.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lisa wants to implement a secure authentication system on a website.

However, instead of collecting and storing user passwords, she wants to use

a third-party system. Which of the following is the BEST choice to meet

this goal?

SAML

Kerberos

SSH

OAuth

Answer explanation

A is correct. Security Assertion Markup Language (SAML) is a single

sign-on SSO solution that can use third-party websites, and it provides

authentication. Kerberos is an SSO solution used on internal networks such

as in Microsoft Active Directory domains. Secure Shell (SSH) is used for

remote administration. OAuth (think of this as Open Authorization) is used

for authorization, but the scenario wants a solution for authentication. See

Chapter 2.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization is implementing an SDN. Management wants to use

an access control scheme that controls access based on attributes. Which of

the following is the BEST solution?

DAC

MAC

Role-BAC

ABAC

Answer explanation

D is correct. A software-defined network (SDN) typically uses an

attribute-based access control (ABAC) scheme. The ABAC scheme is

based on attributes that identify subjects and objects within a policy. A

discretionary access control (DAC) scheme has an owner, and the owner

establishes access for the objects. A mandatory access control (MAC)

scheme uses labels assigned to subjects and objects. A role-based access

control scheme uses roles or groups to assign rights and permissions. See

Chapter 2.