Security+ Study Guide-05 Securing Hosts and Data
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
Alejandro Hidalgo
Used 12+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Attackers recently exploited vulnerabilities in a web server hosted by your organization. Management has tasked administrator with checking the server and eliminating any weak configurations on it.
Which of the following will meet this goal?
Installing a NIDS
Disabling unnecessary services
Enabling root acounts
Implementing SSL encryption
Answer explanation
Unnecessary open ports and services are common elements that contribute to weak configurations so it’s important to close ports that aren’t needed and disable unnecessary services.
A network-based intrusion detection system (NIDS) helps protect internal systems, but a NIDS would not be installed on the server and administrators are tasked with checking the server.
Unsecured root accounts indicate a weak configuration. If root accounts are disabled, enabling them won’t increase security on the server.
Secure Sockets Layer (SSL) is a weak encryption protocol and should not be implemented on servers.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The BizzFad organization develops and sells software. Occasionally they update the software to fix security vulnerabilities and/or add additional features. However, before resealing these updates to customers, they test them in different environments.
Which of the following solutions provides the BEST method to test the updates?
Baseline configuration
BYOD
Sandbox
Change management
Answer explanation
A sandbox provides a simple method of testing updates. It provides an isolated environment and is often used for testing.
A baseline configuration is a starting point of a computing environment.
Bring your own device (BYOD) refers to allowing employee-owned mobile devices in a network and is not related to this question. Change management practices ensure changes are not applied until they are approved and documented.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Network administrators have identified what appears to be malicious traffic coming from an internal computer, but only when no one is logged on the computer. You suspect the system is infected with malware. It periodically runs an application that attempts to run hping3 via remote websites. After comparing the computer with a list of applications from the master image, they verify this application is likely the problem.
What allowed them to make this determination?
Version control
Sandbox
Blacklist
Integrity measurements
Answer explanation
The master image is the baseline, and the administrators performed integrity measurements to identify baseline deviations. By comparing the list of applications in the baseline with the applications running on the suspect computer, it's possible to identify unauthorized applications.
None of the other answers include the troubleshooting steps necessary to discover the problem.
Version control tracks software version as software is updated.
A sandbox is an isolated are of a system, typically used to test applications.
A blacklist is a list of prohibited applications
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
While investigating a recent data breach, investigators discovered a RAT on Bart's computer. Antivirus software didn't detect it. Logs show a user with local administrator privileges installed it.
Which of the following answer has the BEST change of preventing this from happening again in the future?
Enforce an application allow list
Enforce an application block list
Implement a BYOD policy
Implement a DLP policy
Answer explanation
Enforcing an application allow list (sometimes called an application whitelist) would prevent this. An application allow list identifies the only applications that can be installed on a computer and would not include a malicious remote access tool (RAT).
An application block list identifies applications to block, but malware changes so often, this wouldn’t help.
Code signing verifies code is valid and hasn’t been modified.
A bring your own device (BYOD) policy identifies mobile devices employees can buy and connect to a network but is unrelated to this question.
A data loss protection (DLP) system typically monitors outgoing traffic and wouldn’t stop a user from installing a malicious application.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Salespeople within a company regularly take company-owned laptops with them on the road. The company wants to implement a solution to protect laptop drives against data theft.
DLP
HSM
MDM
SEDs
Answer explanation
Self-encrypting drives (SEDs) are the best solution. SEDs have encryption circuitry built into the drive. They encrypt and decrypt data without user interaction, though it's common to require personnel to use credentials to unlock the SED when booted.
A data loss prevention (DLP) solution typically monitors outgoing traffic to prevent confidential information from getting outside the organization.
A hardware security module (HSM) is used to manage, generate, and store cryptographic keys. It's generally used on a network instead of on laptops.
Mobile device management (MDM) refers to technologies used to manage mobile devices.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Managers within your organization want to implement a secure boot for some key computers. During the boot process, each computer should send data to a remote system to check the computer's configuration.
Which of the following will meet this goal?
Trusted Platform Module
Hardware root of trust
Remote attestation
Tokenization
Answer explanation
A remote attestation process checks a computer during the boot cycle and sends a report to a remote system. The remote system attests or confirms that the computer is secure.
None of the other answers sends data to a remote system.
A Trusted Platform Module (TPM) is a hardware chip on a motherboard and provides a local secure boot process.
A TPM includes an encryption key burned into the CPU, which provides a hardware root of trust. Tokenization replaces sensitive data with a token or substitute value, and this token can be used in place of the original data.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Your organization recently updated its security policy to prohibit the use of external storage devices. The goal is to reduce threats from insiders.
Which of the following methods would have the BEST chance of reducing the risk of data exfiltration using external storage devices?
Train employees about the policy
Monitor firewall logs to detect data exfiltration
Block write capabilities to removable media
Implement a network-based DLP solution
Answer explanation
Blocking write capabilities to removable media is the best choice. This can be done with a data loss prevention (DLP) solution on all computers. Training employees might help, but it won’t stop an insider threat.
Monitoring firewall logs might detect data exfiltration out of the network, but it won’t monitor the use of external storage devices.
A network-based DLP solution might detect and stop data exfiltration out of the network, but it would stop users from copying data to removable media.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1
Quiz
•
Professional Development
10 questions
AWS Practitioner - 10
Quiz
•
Professional Development
20 questions
class 8
Quiz
•
Professional Development
12 questions
Cycle 4: Session 8 Review.
Quiz
•
Professional Development
14 questions
Day 1 - Basics of Java
Quiz
•
Professional Development
20 questions
Mobile Apps PayKu
Quiz
•
1st Grade - Professio...
10 questions
Roblox z Lua 10-12 - II QUIZ
Quiz
•
Professional Development
14 questions
Web Basic
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
