Sec+ CH.5 Review Test

Sec+ CH.5 Review Test

Professional Development

15 Qs

quiz-placeholder

Similar activities

aXQtMjktMTEtMjAyMg==

aXQtMjktMTEtMjAyMg==

Professional Development

10 Qs

CHFI-Post-Assessment

CHFI-Post-Assessment

Professional Development

10 Qs

Cycle 4: Session 8 Review.

Cycle 4: Session 8 Review.

Professional Development

12 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

6INFOMAN (Recitation)

6INFOMAN (Recitation)

University - Professional Development

20 Qs

C programming_Shivank

C programming_Shivank

Professional Development

20 Qs

M365 Security Pillar 1 (Identity & Access Management)

M365 Security Pillar 1 (Identity & Access Management)

Professional Development

10 Qs

Cloud computing

Cloud computing

Professional Development

10 Qs

Sec+ CH.5 Review Test

Sec+ CH.5 Review Test

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Prem Jadhwani

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attackers recently exploited vulnerabilities in a web server hosted by

your organization. Management has tasked administrators with checking the

server and eliminating any weak configurations on it. Which of the

following will meet this goal?

Installing a NIDS

Disabling unnecessary services

Enabling root accounts

Implementing SSL encryption

Answer explanation

B is correct. Unnecessary open ports and services are common elements

that contribute to weak configurations so it’s important to close ports that

aren’t needed and disable unnecessary services. A network-based intrusion

detection system (NIDS) helps protect internal systems, but a NIDS would

not be installed on the server and administrators are tasked with checking

the server. Unsecured root accounts indicate a weak configuration. If root

accounts are disabled, enabling them won’t increase security on the server.

Secure Sockets Layer (SSL) is a weak encryption protocol and should not

be implemented on servers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The BizzFad organization develops and sells software. Occasionally they

update the software to fix security vulnerabilities and/or add additional

features. However, before releasing these updates to customers, they test

them in different environments. Which of the following solutions provides

the BEST method to test the updates?

Baseline configuration

BYOD

Sandbox

Change management

Answer explanation

C is correct. A sandbox provides a simple method of testing updates. It

provides an isolated environment and is often used for testing. A baseline

configuration is a starting point of a computing environment. Bring your

own device (BYOD) refers to allowing employee-owned mobile devices in

a network and is not related to this question. Change management practices

ensure changes are not applied until they are approved and documented.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network administrators have identified what appears to be malicious

traffic coming from an internal computer, but only when no one is logged

on to the computer. You suspect the system is infected with malware. It

periodically runs an application that attempts to run hping3 via remote

websites. After comparing the computer with a list of applications from the

master image, they verify this application is likely the problem. What

allowed them to make this determination?

Version control

Sandbox

Blacklist

Integrity measurements

Answer explanation

D is correct. The master image is the baseline, and the administrators

performed integrity measurements to identify baseline deviations. By

comparing the list of applications in the baseline with the applications

running on the suspect computer, it’s possible to identify unauthorized

applications. None of the other answers include the troubleshooting steps

necessary to discover the problem. Version control tracks software versions

as software is updated. A sandbox is an isolated area of a system, typically

used to test applications. A blacklist is a list of prohibited applications.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While investigating a recent data breach, investigators discovered a RAT

on Bart’s computer. Antivirus software didn’t detect it. Logs show a user

with local administrator privileges installed it. Which of the following

answers has the BEST chance of preventing this from happening again in

the future?

Enforce an application allow list.

Enforce an application block list.

Implement a BYOD policy.

Implement a DLP system.

Answer explanation

A is correct. Enforcing an application allow list (sometimes called an

application whitelist) would prevent this. An application allow list identifies

the only applications that can be installed on a computer and would not

include a malicious remote access tool (RAT). An application block list

identifies applications to block, but malware changes so often, this wouldn’t

help. Code signing verifies code is valid and hasn’t been modified. A bring

your own device (BYOD) policy identifies mobile devices employees can

buy and connect to a network but is unrelated to this question. A data loss

protection (DLP) system typically monitors outgoing traffic and wouldn’t

stop a user from installing a malicious application.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Salespeople within a company regularly take company-owned laptops

with them on the road. The company wants to implement a solution to

protect laptop drives against data theft. The solution should operate without

user interaction for ease of use. Which of the following is the BEST choice

to meet these needs?

DLP

HSM

MDM

SEDs

Answer explanation

D is correct. Self-encrypting drives (SEDs) are the best solution. SEDs

have encryption circuitry built into the drive. They encrypt and decrypt data

without user interaction, though it’s common to require personnel to use

credentials to unlock the SED when booted. A data loss prevention (DLP)

solution typically monitors outgoing traffic to prevent confidential

information from getting outside the organization. A hardware security

module (HSM) is used to manage, generate, and store cryptographic keys.

It’s generally used on a network instead of on laptops. Mobile device

management (MDM) refers to technologies used to manage mobile devices.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Managers within your organization want to implement a secure boot

process for some key computers. During the boot process, each computer

should send data to a remote system to check the computer’s configuration.

Which of the following will meet this goal?

Trusted Platform Module

Hardware root of trust

Remote attestation

Tokenization

Answer explanation

C is correct. A remote attestation process checks a computer during the

boot cycle and sends a report to a remote system. The remote system attests

or confirms that the computer is secure. None of the other answers sends

data to a remote system. A Trusted Platform Module (TPM) is a hardware

chip on a motherboard and provides a local secure boot process. A TPM

includes an encryption key burned into the CPU, which provides a

hardware root of trust. Tokenization replaces sensitive data with a token or

substitute value, and this token can be used in place of the original data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization recently updated its security policy to prohibit the use

of external storage devices. The goal is to reduce threats from insiders.

Which of the following methods would have the BEST chance of reducing

the risk of data exfiltration using external storage devices?

Train employees about the policy.

Monitor firewall logs to detect data exfiltration.

Block write capabilities to removable media.

Implement a network-based DLP solution.

Answer explanation

C is correct. Blocking write capabilities to removable media is the best

choice. This can be done with a data loss prevention (DLP) solution on all

computers. Training employees might help, but it won’t stop an insider

threat. Monitoring firewall logs might detect data exfiltration out of the

network, but it won’t monitor the use of external storage devices. A

network-based DLP solution might detect and stop data exfiltration out of

the network, but it would stop users from copying data to removable media.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?