SEC+ Ch.8 Review Test
Quiz
•
Computers
•
Professional Development
•
Hard
Prem Jadhwani
Used 3+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A server within your organization has suffered six hardware failures in the past year. IT management personnel have valued the server at $4,000, and each failure resulted in a 10 percent loss. What is the ALE?
$400
$2400
$4000
$6000
Answer explanation
B is correct. The annual loss expectancy (ALE) is $2,400. It is calculated as single loss expectancy (SLE) × annual rate of occurrence (ARO). Each failure has resulted in a 10 percent loss (meaning that it cost 10 percent of the asset value to repair it). The SLE is 10 percent of $4,000 ($400), and the ARO is 6. 6 × $400 is $2400.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Maggie is performing a risk assessment on a database server. While doing so, she created a document showing all the known risks to this server, along with the risk score for each risk. Which of the following BEST identifies the name of this document?
Qualitative risk assessment
Quantitative risk assessment
Risk register
Residual risk
Answer explanation
C is correct. A risk register lists all known risks for an asset, such as a database server, and it typically includes a risk score (the combination of the likelihood of occurrence and the impact of the risk). Risk assessments (including qualitative and quantitative risk assessments) might use a risk register, but they are not risk registers. Residual risk refers to the remaining risk after applying security controls to mitigate a risk.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization hosts an e-commerce website used to sell digital products. You are tasked with evaluating all the elements used to support this website. What are you performing?
Quantitative assessment
Qualitative assessment
Threat hunting
Supply chain assessment
Answer explanation
D is correct. A supply chain assessment evaluates all the elements used to create, sell, and distribute a product. The National Institute of Standards and
Technology (NIST) Risk Management Framework (RMF) (NIST SP 800-
37 r2) provides steps for reducing supply chain risks. Risk assessments (including both quantitative and qualitative risk assessments) evaluate risks, but don’t evaluate the supply chain required to support an e-commerce website. Threat hunting is the process of actively looking for threats within a network before an automated tool detects and reports on the threat.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following elements are used as part of threat hunting?
(Choose two.)
Intelligence fusion
Vulnerability scan
Advisories and bulletins
Configuration review
Answer explanation
A and C are correct. Intelligence fusion and advisories and bulletins are part of threat hunting. Threat hunting is the process of actively looking for threats within a network before an automated tool detects and reports on the threat. Vulnerability scans are used as part of a security assessment. Although a history of vulnerability scans and related logs may be part of the intelligence fusion, CompTIA objectives specifically list the following four elements: intelligence fusion, advisories and bulletins, threat feeds, and predictions of how attackers may maneuver though the network. A configuration review verifies that systems are configured correctly.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Maggie suspects that a server may be running unnecessary services. Which of the following tools is the BEST choice to identify the services running on the server?
Dnsenum
IP scanner
Passive reconnaissance
Nmap
Answer explanation
D is correct. Nmap is a network scanner, and it can detect the protocols and services running on a server. The dnsenum command will enumerate (or list) Domain Name System (DNS) records for domains. An IP scanner detects IPs active on a network but not the services running on the individual hosts. Passive reconnaissance uses open source intelligence (OSINT) instead of active tools.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to identify all the services running on a server in your network.
Which of the following tools is the BEST choice to meet this goal?
Penetration test
Protocol analyzer
Non-credentialed scan
Port scanner
Answer explanation
D is correct. A port scanner identifies open ports on a system and is commonly used to determine what services are running on the system. Vulnerability scanners often include port-scanning capabilities, and they can help identify potential weak configurations. A penetration test attempts to exploit a vulnerability. A protocol analyzer can analyze traffic and discover protocols in use, but this would be much more difficult than using a port scanner. A non-credentialed scan refers to a vulnerability scan, and while a vulnerability scan may reveal services running on a server, it won’t be as specific as a port scan.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You recently completed a vulnerability scan on a database server. The scan didn’t report any issues. However, you know that it is missing a patch. The patch wasn’t applied because it causes problems with the database application. Which of the following BEST describes this?
False negative
False positive
Credential scan
Non-credentialed scan
Answer explanation
A is correct. A false negative occurs if a vulnerability scanner does not report a known vulnerability. A false positive occurs when a vulnerability scanner reports a vulnerability that doesn’t exist. The scenario doesn’t indicate if the scan was run under the context of an account (credentialed) or anonymously (non-credentialed), so these answers aren’t relevant to the question.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
SQL Programming Revision
Quiz
•
Professional Development
11 questions
Technology Morning Tea Quiz
Quiz
•
KG - Professional Dev...
10 questions
SQL Commands - SELECT Statements
Quiz
•
Professional Development
18 questions
wu3retofinal
Quiz
•
Professional Development
10 questions
Day 3 C Programming quiz
Quiz
•
Professional Development
11 questions
Types of Mass Media
Quiz
•
10th Grade - Professi...
17 questions
Volume 2
Quiz
•
Professional Development
10 questions
Friday Fun
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
Discover more resources for Computers
10 questions
Halloween
Quiz
•
Professional Development
16 questions
Spooky Season Quiz
Quiz
•
Professional Development
5 questions
11.4.25 Student Engagement & Discourse
Lesson
•
Professional Development
50 questions
ASL Colors and Clothes
Quiz
•
KG - Professional Dev...
15 questions
Ohms Law
Quiz
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
