Security+ Lesson5

Quiz
•
Computers
•
Professional Development
•
Hard

Alejandro Hidalgo
Used 6+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of tool is often used to capture and analyze network traffic?
Network mapper
Protocol analyzer
Wireless analyzer
Database vulnerability tester
Answer explanation
Network analyzer captures and analyzes network traffic. It can read packet headers to determine traffic patterns or view protocol information in depth. It is also known as a packet analyzer or protocol analyzer.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have implemented a passive monitoring system that is designed to keep administrators aware of malicious activity and can record detected intrusions in a database and send alert notifications so that the administrators can take action. Which of the following have you implemented?
Stateful firewall
Application layer firewall
IDS
IPS
Answer explanation
You have implemented IDS as intrusion detection systems are fundamentally passive monitoring systems designed to keep administrators aware of malicious activity: they can record detected intrusions in a database and send alert notifications, but they rely on humans to take action. IDS will never delay or interrupt traffic due to a false positive.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following Syslog severity levels is an error or a problem condition that is immediately harmless or correctable but might need user review?
Error
Warning
Informational
Notice
Answer explanation
The severity level is an essential concept for event logging in general. Syslog defines eight levels, ranging from emergency messages about severe error conditions to detailed information on everyday activities that can be used to troubleshoot application functions. The warning is an error or a problem condition that is immediately harmless or correctable but might need user review.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are asked to analyze the aggregated events to find useful data that might need additional human review. Which of the following SIEM software features will you use?
Log retention
Alerts
Correlation
Aggregation
Answer explanation
Correlation analyzes aggregated events to find useful data that might need additional human review. Correlation engines work by finding relationships and trends within a large volume of events, filtering out irrelevant data, and highlighting what is most likely to be of interest to administrators. For example, if an unfamiliar application is linked to a known-bad IP address, it becomes more suspect even if nothing is obviously wrong with it.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What SNMP component is a unique number corresponding to an object property that can be monitored on a managed device?
MIB
Manager
Agent
OID
Answer explanation
Object Identifier (OID) is a unique number corresponding to an object property that can be monitored on a managed device. For example, on a switch, the up or down status of a particular interface might be an object, as would be its rate of incoming traffic. (The actual value of an object is called a variable.)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following commands will display the last 30 lines of a file named logfile2.txt?
head -n 30 logfile2.txt
tail -n 30 logfile2.txt
grep -n 30 logfile2.txt
cat -n 30 logfile2.txt
Answer explanation
The tail command retrieves and displays the last part of a file. The following command will display the last 30 lines of a file named logfile2.txt:
tail -n 30 logfile2.txt
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of proxy would you use to mediate communications between LAN clients and internet servers but require client-side configuration?
Forward
Reverse
Transparent
Anonymous
Answer explanation
Forward proxies mediate communications between LAN clients and internet servers but require client-side configuration. They’re often used on small but heavily secured networks.
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your department has implemented a decoy having no useful resources and isolated it from the rest of the network so that compromising it won’t even be useful for mounting an inside attack. What technique is being used?
NGFW
IPS
Honeypot
Anomaly analysis
Answer explanation
A honeypot system is designed to be attractive and accessible to attackers. It might be completely open, or it might have an outwardly reasonable but flawed or inadequate level of security. In truth, it’s a decoy: the honeypot has no useful resources, and it’s isolated from the rest of the network (in a DMZ, for example) so that compromising it won’t even be useful for mounting an inside attack. Instead, it’s monitored to gather information on attackers without actually risking the consequences of an attack on real systems or other network locations. More sophisticated decoys live right among functional systems and files, but since legitimate users never access them, unexpected communications are automatically suspicious.
Similar Resources on Wayground
8 questions
Quizziz Pelatihan Coding & AI - SD - Hari 5

Quiz
•
Professional Development
10 questions
Chapter 4 Review Questions

Quiz
•
Professional Development
11 questions
ICT Comp Arch & Sec - Lesson 4 - Software

Quiz
•
Professional Development
10 questions
Microsoft Power Platform Functional Consultant

Quiz
•
Professional Development
10 questions
Technology Training: Check-up Exercise

Quiz
•
Professional Development
10 questions
Linux Quiz 2

Quiz
•
Professional Development
10 questions
Python Basics

Quiz
•
Professional Development
10 questions
Perform Word Processing

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
15 questions
Fun Random Trivia

Quiz
•
Professional Development
22 questions
Anne Bradstreet 1612-1672

Quiz
•
Professional Development
18 questions
Spanish Speaking Countries and Capitals

Quiz
•
KG - Professional Dev...
14 questions
Fall Trivia

Quiz
•
11th Grade - Professi...
15 questions
Disney Characters Quiz

Quiz
•
Professional Development
15 questions
Quiz to Highlight Q types & other great features in Wayground

Quiz
•
Professional Development