SEC+ Q01

SEC+ Q01

Professional Development

30 Qs

quiz-placeholder

Similar activities

Circuit Isolation

Circuit Isolation

Professional Development

25 Qs

Mercedes-EQ test

Mercedes-EQ test

Professional Development

26 Qs

What is zkEVM ?

What is zkEVM ?

Professional Development

25 Qs

Cna Exam Review 2025

Cna Exam Review 2025

Professional Development

33 Qs

hacking History & Types Basic

hacking History & Types Basic

Professional Development

25 Qs

AVSEC QUIZZIZ

AVSEC QUIZZIZ

Professional Development

33 Qs

Advanced Teaching Methods

Advanced Teaching Methods

Professional Development

25 Qs

Teacher prep: RICA subtest 3

Teacher prep: RICA subtest 3

Professional Development

25 Qs

SEC+ Q01

SEC+ Q01

Assessment

Quiz

Education

Professional Development

Hard

Created by

Luis Barreiros

Used 2+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A6. You’ve hired a third-party to gather information about

your company’s servers and data. The third-party will not

have direct access to your internal network but can gather

information from any other source.

Which of the following would BEST describe this

approach?

A. Backdoor testing

B. Passive footprinting

C. OS fingerprinting

D. Partially known environment

Answer explanation

The Answer: B. Passive footprinting

Passive footprinting focuses on learning as much information from

open sources such as social media, corporate websites, and business

organizations.

The incorrect answers:

A. Backdoor testing

Some active reconnaissance tests will directly query systems to see if a

backdoor has been installed.

C. OS fingerprinting

To fingerprint an operating system, you must actively query and receive

responses across the network.

D. Partially known environment

A partially known environment penetration test is a focused approach

that usually provides detailed information about specific systems or

applications.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A7. Which of these protocols use TLS to provide secure

communication? (Select TWO)

A. HTTPS

B. SSH

C. FTPS

D. SNMPv2

E. DNSSEC

Answer explanation

The Answer: A. HTTPS and C. FTPS

TLS (Transport Layer Security) is a cryptographic protocol used to

encrypt network communication. HTTPS is the Hypertext Transfer

Protocol over TLS, and FTPS is the File Transfer Protocol over TLS.

An earlier version of TLS is SSL (Secure Sockets Layer). Although

we don’t commonly see SSL in use any longer, you may see TLS

communication referenced as SSL.

The incorrect answers:

B. SSH

SSH (Secure Shell) can use symmetric or asymmetric encryption, but

those ciphers are not associated with TLS.

D. SNMPv2

SNMPv2 (Simple Network Management Protocol version 2) does not

implement TLS, or any encryption, within the network communication.

E. DNSSEC

DNSSEC (DNS security extensions) do not provide any confidentiality

of data.

F. SRTP

SRTP (Secure Real-time Transport Protocol) is a VoIP (Voice over IP)

protocol used for encrypting conversations. SRTP protocol commonly uses

AES (Advanced Encryption Standard) for confidentiality.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A8. Which of these threat actors would be MOST likely to

attack systems for direct financial gain?

A. Organized crime

B. Hacktivist

C. Nation state

D. Competitor

Answer explanation

The Answer: A. Organized crime

An organized crime actor is motivated by money, and their hacking

objectives are usually based around objectives that can be easily exchanged

for financial capital.

The incorrect answers:

B. Hacktivist

A hacktivist is focused on a political agenda and not commonly on a

financial gain.

C. Nation state

Nation states are already well funded, and their primary objective is not

usually based on revenue or income.

D. Competitor

A competitor doesn’t have any direct financial gain by disrupting a

website or stealing customer lists, and often their objective is to disable

a competitor’s business or to harm their reputation. If there is a financial

gain, it would often be an indirect result of an attack.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A9. A security incident has occurred on a file server. Which of

the following data sources should be gathered to address

file storage volatility? (Select TWO)

A. Partition data

B. Kernel statistics

C. ROM data

D. Temporary file systems

E. Process table

Answer explanation

The Answer: A. Partition data and D. Temporary file systems

Both temporary file system data and partition data are part of the file

storage subsystem.

The incorrect answers:

B. Kernel statistics

Kernel statistics are stored in memory.

C. ROM data

ROM data is a type of memory storage.

E. Process table

The process table keeps track of system processes, and it stores this

information in RAM.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A10. An IPS at your company has found a sharp increase

in traffic from all-in-one printers. After researching,

your security team has found a vulnerability associated

with these devices that allows the device to be remotely

controlled by a third-party. Which category would BEST

describe these devices?

A. IoT

B. RTOS

C. MFD

D. SoC

Answer explanation

The Answer: C. MFD

An all-in-one printer that can print, scan, and fax is often categorized as

an MFD (Multifunction Device).

The incorrect answers:

A. IoT

Wearable technology and home automation devices are commonly called

IoT (Internet of Things) devices.

B. RTOS

RTOS (Real-time Operating Systems) are commonly used in

manufacturing and automobiles.

D. SoC

Multiple components that run on a single chip are categorized as an SoC

(System on a Chip).

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A11. Which of the following standards provides information

on privacy and managing PII?

A. ISO 31000

B. ISO 27002

C. ISO 27701

D. ISO 27001

Answer explanation

The Answer: C. ISO 27701

The ISO (International Organization for Standardization) 27701

standard extends the ISO 27001 and 27002 standards to include detailed

management of PII (Personally Identifiable Information) and data privacy.

The incorrect answers:

A. ISO 31000

The ISO 31000 standard sets international standards for risk management

practices.

B. ISO 27002

Information security controls are the focus of the ISO 27002 standard.

D. ISO 27001

The ISO 27001 standard is the foundational standard for Information

Security Management Systems (ISMS).

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A12. Elizabeth, a security administrator, is concerned about

the potential for data exfiltration using external storage

drives. Which of the following would be the BEST way

to prevent this method of data exfiltration?

A. Create an operating system security policy to

prevent the use of removable media

B. Monitor removable media usage in host-based

firewall logs

C. Only allow applications that do not use

removable media

D. Define a removable media block rule in the UTM

Answer explanation

The Answer: A. Create an operating system security policy to prevent

the use of removable media

Removable media uses hot-pluggable interfaces such as USB to connect

storage drives. A security policy in the operating system can prevent any

files from being written to a removable drive.

The incorrect answers:

B. Monitor removable media usage in host-based firewall logs

A host-based firewall monitors traffic flows and does not commonly log

hardware or USB drive access.

C. Only allow applications that do not use removable media

File storage access options are not associated with applications, so it’s not

possible to allow based on external storage drive usage.

D. Define a removable media block rule in the UTM

A UTM (Unified Threat Manager) watches traffic flows across the

network and does not commonly manage the storage options on individual

computers.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?