Sec+ CH.4 Review Test

Sec+ CH.4 Review Test

Professional Development

15 Qs

quiz-placeholder

Similar activities

AZ-900 Practice Test 8

AZ-900 Practice Test 8

Professional Development

17 Qs

Sec+ Quiz - 2

Sec+ Quiz - 2

Professional Development

15 Qs

Intro to Cybersecurity 3

Intro to Cybersecurity 3

12th Grade - Professional Development

12 Qs

Cyber Quiz

Cyber Quiz

Professional Development

17 Qs

OSI Model

OSI Model

University - Professional Development

18 Qs

Pre Test CTIA

Pre Test CTIA

Professional Development

10 Qs

Sec+ CH.1 Review Test

Sec+ CH.1 Review Test

Professional Development

15 Qs

Storage- PreAssessment

Storage- PreAssessment

Professional Development

10 Qs

Sec+ CH.4 Review Test

Sec+ CH.4 Review Test

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Prem Jadhwani

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A HIDS reported a vulnerability on a system based on a known attack.

After researching the alert from the HIDS, you identify the recommended

solution and begin applying it. What type of HIDS is in use?

Network-based

Signature-based

Heuristic-based

Anomaly-based

Answer explanation

B is correct. If the host-based intrusion detection system (HIDS)

identified a known issue, it is using signature-based detection (sometimes

called definition-based detection). A HIDS is not network-based but a

network-based IDS (NIDS) can also use signature-based detection.

Heuristic-based or behavior-based (sometimes called anomaly-based)

detection systems identify issues by comparing current activity against a

baseline. They can identify issues that are not previously known.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are preparing to deploy a heuristic-based detection system to

monitor network activity. Which of the following would you create first?

BPDU guard

Signatures

Baseline

Honeypot

Answer explanation

C is correct. A heuristic-based (also called behavior-based or anomaly-

based) detection system compares current activity with a previously created

baseline to detect any anomalies or changes. Signature-based systems (also

called definition-based) use signatures of known attack patterns to detect

attacks. A honeypot is a server designed to look valuable to an attacker and

can divert attacks. A Bridge Protocol Data Unit (BPDU) guard is used to

protect against BPDU-related attacks and is unrelated to this question.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lenny noticed a significant number of logon failures for administrator

accounts on the organization’s public website. After investigating it further,

he notices that most of these attempts are from IP addresses assigned to

foreign countries. He wants to implement a solution that will detect and

prevent similar attacks. Which of the following is the BEST choice?

Implement a passive NIDS.

Block all traffic from foreign countries.

Implement an inline NIPS.

Disable the administrator accounts.

Answer explanation

C is correct. An inline network-based intrusion prevention system (NIPS)

can dynamically detect, react to, and prevent attacks. An inline system is

placed inline with the traffic, and in this scenario, it can be configured to

detect the logon attempts and block the traffic from the offending IP

addresses before it reaches the internal network. A passive network-based

intrusion detection system (NIDS) is not placed inline with the traffic and

can only detect the traffic after it has reached the internal network, so it

cannot prevent the attack. If you block all traffic from foreign countries,

you will likely block legitimate traffic. You should disable administrator

accounts if they’re not needed. However, if you disable all administrator

accounts, administrators won’t be able to do required work.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lisa created a document called password.txt and put the usernames of

two accounts with elevated privileges. She then placed the file on her

administrator account desktop on several servers. Which of the following

BEST explains her actions?

She can use this file to retrieve the passwords if she forgets them.

This file will divert attackers from the live network.

The document is a honeyfile.

The file is needed by an application to run when the system starts.

Answer explanation

C is correct. A honeyfile is a file with a deceptive name (such as

password.txt) that will deceive an attacker and attract his attention. It is not

appropriate to place a file holding credentials on a desktop for any reason.

A honeypot or honeynet diverts attackers from the live network. A file on

an administrator’s desktop is on the live network. It is unlikely that any

application needs a file named password.txt to run. Even if an application

needed such a file, the file would be inaccessible if it is placed on an

administrator’s desktop.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization is planning to upgrade the wireless network used by

employees. It will provide encrypted authentication of wireless users over

TLS. Which of the following protocols are they MOST likely

implementing?

EAP

PEAP

WPA2

WPA3

Answer explanation

B is correct. Protected EAP (PEAP) can be used for wireless

authentication and it uses Transport Layer Security (TLS) to encapsulate

and encrypt the authentication conversation within a TLS tunnel. Extensible

Authentication Protocol (EAP) is the basic framework for authentication.

By itself, EAP doesn’t provide encryption, but it can be combined with

other encryption protocols. Neither Wi-Fi Protected Access 2 (WPA2) nor

Wi-Fi Protected Access 3 (WPA3) use TLS.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lisa is creating a detailed diagram of wireless access points and hotspots

within your organization. What is another name for this?

Remote access VPN

Wireless footprinting

Channel overlap map

Architectural diagram

Answer explanation

B is correct. Wireless footprinting creates a detailed diagram of wireless

access points and hotspots within an organization. It typically displays a

heat map and dead spots if they exist. A remote access virtual private

network (VPN) provides access to a private network and is unrelated to this

question. Wi-Fi analyzers provide a graph showing channel overlaps but not

a diagram of wireless access points. An architectural diagram is typically

laid on top of a heat map to create the wireless footprint document, but by

itself, it shows the building layout.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are assisting a small business owner in setting up a public wireless

hotspot for her customers. She wants to allow customers to access the

hotspot without entering a password. Which of the following is MOST

appropriate for this hotspot?

Use Open mode.

Use a PSK.

Use Enterprise mode.

Disable SSID broadcast.

Answer explanation

A is correct. Open mode is the best choice of those given for a public

wireless hotspot that doesn’t require a password. A pre-shared key (PSK) is

the same as a password and the scenario says a password isn’t desired.

Enterprise mode requires each user to authenticate and is typically enabled

with a RADIUS server. If you disable service set identifier (SSID)

broadcast, it will make it harder for the customers to find the hotspot, but

unless Open mode is used, it will still require a password.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?