
SEC+ Q01

Quiz
•
Education
•
Professional Development
•
Hard
Luis Barreiros
Used 2+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A6. You’ve hired a third-party to gather information about
your company’s servers and data. The third-party will not
have direct access to your internal network but can gather
information from any other source.
Which of the following would BEST describe this
approach?
A. Backdoor testing
B. Passive footprinting
C. OS fingerprinting
D. Partially known environment
Answer explanation
The Answer: B. Passive footprinting
Passive footprinting focuses on learning as much information from
open sources such as social media, corporate websites, and business
organizations.
The incorrect answers:
A. Backdoor testing
Some active reconnaissance tests will directly query systems to see if a
backdoor has been installed.
C. OS fingerprinting
To fingerprint an operating system, you must actively query and receive
responses across the network.
D. Partially known environment
A partially known environment penetration test is a focused approach
that usually provides detailed information about specific systems or
applications.
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A7. Which of these protocols use TLS to provide secure
communication? (Select TWO)
A. HTTPS
B. SSH
C. FTPS
D. SNMPv2
E. DNSSEC
Answer explanation
The Answer: A. HTTPS and C. FTPS
TLS (Transport Layer Security) is a cryptographic protocol used to
encrypt network communication. HTTPS is the Hypertext Transfer
Protocol over TLS, and FTPS is the File Transfer Protocol over TLS.
An earlier version of TLS is SSL (Secure Sockets Layer). Although
we don’t commonly see SSL in use any longer, you may see TLS
communication referenced as SSL.
The incorrect answers:
B. SSH
SSH (Secure Shell) can use symmetric or asymmetric encryption, but
those ciphers are not associated with TLS.
D. SNMPv2
SNMPv2 (Simple Network Management Protocol version 2) does not
implement TLS, or any encryption, within the network communication.
E. DNSSEC
DNSSEC (DNS security extensions) do not provide any confidentiality
of data.
F. SRTP
SRTP (Secure Real-time Transport Protocol) is a VoIP (Voice over IP)
protocol used for encrypting conversations. SRTP protocol commonly uses
AES (Advanced Encryption Standard) for confidentiality.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A8. Which of these threat actors would be MOST likely to
attack systems for direct financial gain?
A. Organized crime
B. Hacktivist
C. Nation state
D. Competitor
Answer explanation
The Answer: A. Organized crime
An organized crime actor is motivated by money, and their hacking
objectives are usually based around objectives that can be easily exchanged
for financial capital.
The incorrect answers:
B. Hacktivist
A hacktivist is focused on a political agenda and not commonly on a
financial gain.
C. Nation state
Nation states are already well funded, and their primary objective is not
usually based on revenue or income.
D. Competitor
A competitor doesn’t have any direct financial gain by disrupting a
website or stealing customer lists, and often their objective is to disable
a competitor’s business or to harm their reputation. If there is a financial
gain, it would often be an indirect result of an attack.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A9. A security incident has occurred on a file server. Which of
the following data sources should be gathered to address
file storage volatility? (Select TWO)
A. Partition data
B. Kernel statistics
C. ROM data
D. Temporary file systems
E. Process table
Answer explanation
The Answer: A. Partition data and D. Temporary file systems
Both temporary file system data and partition data are part of the file
storage subsystem.
The incorrect answers:
B. Kernel statistics
Kernel statistics are stored in memory.
C. ROM data
ROM data is a type of memory storage.
E. Process table
The process table keeps track of system processes, and it stores this
information in RAM.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A10. An IPS at your company has found a sharp increase
in traffic from all-in-one printers. After researching,
your security team has found a vulnerability associated
with these devices that allows the device to be remotely
controlled by a third-party. Which category would BEST
describe these devices?
A. IoT
B. RTOS
C. MFD
D. SoC
Answer explanation
The Answer: C. MFD
An all-in-one printer that can print, scan, and fax is often categorized as
an MFD (Multifunction Device).
The incorrect answers:
A. IoT
Wearable technology and home automation devices are commonly called
IoT (Internet of Things) devices.
B. RTOS
RTOS (Real-time Operating Systems) are commonly used in
manufacturing and automobiles.
D. SoC
Multiple components that run on a single chip are categorized as an SoC
(System on a Chip).
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A11. Which of the following standards provides information
on privacy and managing PII?
A. ISO 31000
B. ISO 27002
C. ISO 27701
D. ISO 27001
Answer explanation
The Answer: C. ISO 27701
The ISO (International Organization for Standardization) 27701
standard extends the ISO 27001 and 27002 standards to include detailed
management of PII (Personally Identifiable Information) and data privacy.
The incorrect answers:
A. ISO 31000
The ISO 31000 standard sets international standards for risk management
practices.
B. ISO 27002
Information security controls are the focus of the ISO 27002 standard.
D. ISO 27001
The ISO 27001 standard is the foundational standard for Information
Security Management Systems (ISMS).
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A12. Elizabeth, a security administrator, is concerned about
the potential for data exfiltration using external storage
drives. Which of the following would be the BEST way
to prevent this method of data exfiltration?
A. Create an operating system security policy to
prevent the use of removable media
B. Monitor removable media usage in host-based
firewall logs
C. Only allow applications that do not use
removable media
D. Define a removable media block rule in the UTM
Answer explanation
The Answer: A. Create an operating system security policy to prevent
the use of removable media
Removable media uses hot-pluggable interfaces such as USB to connect
storage drives. A security policy in the operating system can prevent any
files from being written to a removable drive.
The incorrect answers:
B. Monitor removable media usage in host-based firewall logs
A host-based firewall monitors traffic flows and does not commonly log
hardware or USB drive access.
C. Only allow applications that do not use removable media
File storage access options are not associated with applications, so it’s not
possible to allow based on external storage drive usage.
D. Define a removable media block rule in the UTM
A UTM (Unified Threat Manager) watches traffic flows across the
network and does not commonly manage the storage options on individual
computers.
Create a free account and access millions of resources
Similar Resources on Wayground
30 questions
City & Guilds 8202-20 Mock 001

Quiz
•
Professional Development
29 questions
TINDAKAN PADA SAAT KONDISI TIDAK NORMAL

Quiz
•
Professional Development
25 questions
SOAL PTS AIJ KELAS XI TAHUN 2022/2023

Quiz
•
Professional Development
25 questions
Advanced Teaching Methods

Quiz
•
Professional Development
25 questions
Teacher prep: RICA subtest 3

Quiz
•
Professional Development
25 questions
The KNACK

Quiz
•
Professional Development
25 questions
AWS Q01

Quiz
•
Professional Development
25 questions
Pre Test IKM Sekolah Penggerak

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade