
Sec+ CH.5 Review Test
Authored by Prem Jadhwani
Computers
Professional Development
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Attackers recently exploited vulnerabilities in a web server hosted by
your organization. Management has tasked administrators with checking the
server and eliminating any weak configurations on it. Which of the
following will meet this goal?
Installing a NIDS
Disabling unnecessary services
Enabling root accounts
Implementing SSL encryption
Answer explanation
B is correct. Unnecessary open ports and services are common elements
that contribute to weak configurations so it’s important to close ports that
aren’t needed and disable unnecessary services. A network-based intrusion
detection system (NIDS) helps protect internal systems, but a NIDS would
not be installed on the server and administrators are tasked with checking
the server. Unsecured root accounts indicate a weak configuration. If root
accounts are disabled, enabling them won’t increase security on the server.
Secure Sockets Layer (SSL) is a weak encryption protocol and should not
be implemented on servers.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The BizzFad organization develops and sells software. Occasionally they
update the software to fix security vulnerabilities and/or add additional
features. However, before releasing these updates to customers, they test
them in different environments. Which of the following solutions provides
the BEST method to test the updates?
Baseline configuration
BYOD
Sandbox
Change management
Answer explanation
C is correct. A sandbox provides a simple method of testing updates. It
provides an isolated environment and is often used for testing. A baseline
configuration is a starting point of a computing environment. Bring your
own device (BYOD) refers to allowing employee-owned mobile devices in
a network and is not related to this question. Change management practices
ensure changes are not applied until they are approved and documented.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Network administrators have identified what appears to be malicious
traffic coming from an internal computer, but only when no one is logged
on to the computer. You suspect the system is infected with malware. It
periodically runs an application that attempts to run hping3 via remote
websites. After comparing the computer with a list of applications from the
master image, they verify this application is likely the problem. What
allowed them to make this determination?
Version control
Sandbox
Blacklist
Integrity measurements
Answer explanation
D is correct. The master image is the baseline, and the administrators
performed integrity measurements to identify baseline deviations. By
comparing the list of applications in the baseline with the applications
running on the suspect computer, it’s possible to identify unauthorized
applications. None of the other answers include the troubleshooting steps
necessary to discover the problem. Version control tracks software versions
as software is updated. A sandbox is an isolated area of a system, typically
used to test applications. A blacklist is a list of prohibited applications.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While investigating a recent data breach, investigators discovered a RAT
on Bart’s computer. Antivirus software didn’t detect it. Logs show a user
with local administrator privileges installed it. Which of the following
answers has the BEST chance of preventing this from happening again in
the future?
Enforce an application allow list.
Enforce an application block list.
Implement a BYOD policy.
Implement a DLP system.
Answer explanation
A is correct. Enforcing an application allow list (sometimes called an
application whitelist) would prevent this. An application allow list identifies
the only applications that can be installed on a computer and would not
include a malicious remote access tool (RAT). An application block list
identifies applications to block, but malware changes so often, this wouldn’t
help. Code signing verifies code is valid and hasn’t been modified. A bring
your own device (BYOD) policy identifies mobile devices employees can
buy and connect to a network but is unrelated to this question. A data loss
protection (DLP) system typically monitors outgoing traffic and wouldn’t
stop a user from installing a malicious application.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Salespeople within a company regularly take company-owned laptops
with them on the road. The company wants to implement a solution to
protect laptop drives against data theft. The solution should operate without
user interaction for ease of use. Which of the following is the BEST choice
to meet these needs?
DLP
HSM
MDM
SEDs
Answer explanation
D is correct. Self-encrypting drives (SEDs) are the best solution. SEDs
have encryption circuitry built into the drive. They encrypt and decrypt data
without user interaction, though it’s common to require personnel to use
credentials to unlock the SED when booted. A data loss prevention (DLP)
solution typically monitors outgoing traffic to prevent confidential
information from getting outside the organization. A hardware security
module (HSM) is used to manage, generate, and store cryptographic keys.
It’s generally used on a network instead of on laptops. Mobile device
management (MDM) refers to technologies used to manage mobile devices.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Managers within your organization want to implement a secure boot
process for some key computers. During the boot process, each computer
should send data to a remote system to check the computer’s configuration.
Which of the following will meet this goal?
Trusted Platform Module
Hardware root of trust
Remote attestation
Tokenization
Answer explanation
C is correct. A remote attestation process checks a computer during the
boot cycle and sends a report to a remote system. The remote system attests
or confirms that the computer is secure. None of the other answers sends
data to a remote system. A Trusted Platform Module (TPM) is a hardware
chip on a motherboard and provides a local secure boot process. A TPM
includes an encryption key burned into the CPU, which provides a
hardware root of trust. Tokenization replaces sensitive data with a token or
substitute value, and this token can be used in place of the original data.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization recently updated its security policy to prohibit the use
of external storage devices. The goal is to reduce threats from insiders.
Which of the following methods would have the BEST chance of reducing
the risk of data exfiltration using external storage devices?
Train employees about the policy.
Monitor firewall logs to detect data exfiltration.
Block write capabilities to removable media.
Implement a network-based DLP solution.
Answer explanation
C is correct. Blocking write capabilities to removable media is the best
choice. This can be done with a data loss prevention (DLP) solution on all
computers. Training employees might help, but it won’t stop an insider
threat. Monitoring firewall logs might detect data exfiltration out of the
network, but it won’t monitor the use of external storage devices. A
network-based DLP solution might detect and stop data exfiltration out of
the network, but it would stop users from copying data to removable media.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
支付金融大挑戰
Quiz
•
Professional Development
11 questions
Marvel Future Fight
Quiz
•
KG - Professional Dev...
14 questions
Input, output and storage de
Quiz
•
8th Grade - Professio...
10 questions
Globe Google Workspace Intro
Quiz
•
Professional Development
10 questions
Hành vi tổ chức
Quiz
•
University - Professi...
10 questions
Azure Cloud computing
Quiz
•
Professional Development
20 questions
Teaching Strategy
Quiz
•
Professional Development
13 questions
GRAND OPENING INTERNSHIP EXERCISE 2024
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
12 questions
Unit 5: Puerto Rico W1
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
15 questions
Balance Equations Hangers
Quiz
•
Professional Development
31 questions
Servsafe Food Manager Practice Test 2021- Part 1
Quiz
•
9th Grade - Professio...