
SEC+ Q01
Quiz
•
Education
•
Professional Development
•
Practice Problem
•
Hard
Luis Barreiros
Used 2+ times
FREE Resource
Enhance your content in a minute
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A6. You’ve hired a third-party to gather information about
your company’s servers and data. The third-party will not
have direct access to your internal network but can gather
information from any other source.
Which of the following would BEST describe this
approach?
A. Backdoor testing
B. Passive footprinting
C. OS fingerprinting
D. Partially known environment
Answer explanation
The Answer: B. Passive footprinting
Passive footprinting focuses on learning as much information from
open sources such as social media, corporate websites, and business
organizations.
The incorrect answers:
A. Backdoor testing
Some active reconnaissance tests will directly query systems to see if a
backdoor has been installed.
C. OS fingerprinting
To fingerprint an operating system, you must actively query and receive
responses across the network.
D. Partially known environment
A partially known environment penetration test is a focused approach
that usually provides detailed information about specific systems or
applications.
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A7. Which of these protocols use TLS to provide secure
communication? (Select TWO)
A. HTTPS
B. SSH
C. FTPS
D. SNMPv2
E. DNSSEC
Answer explanation
The Answer: A. HTTPS and C. FTPS
TLS (Transport Layer Security) is a cryptographic protocol used to
encrypt network communication. HTTPS is the Hypertext Transfer
Protocol over TLS, and FTPS is the File Transfer Protocol over TLS.
An earlier version of TLS is SSL (Secure Sockets Layer). Although
we don’t commonly see SSL in use any longer, you may see TLS
communication referenced as SSL.
The incorrect answers:
B. SSH
SSH (Secure Shell) can use symmetric or asymmetric encryption, but
those ciphers are not associated with TLS.
D. SNMPv2
SNMPv2 (Simple Network Management Protocol version 2) does not
implement TLS, or any encryption, within the network communication.
E. DNSSEC
DNSSEC (DNS security extensions) do not provide any confidentiality
of data.
F. SRTP
SRTP (Secure Real-time Transport Protocol) is a VoIP (Voice over IP)
protocol used for encrypting conversations. SRTP protocol commonly uses
AES (Advanced Encryption Standard) for confidentiality.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A8. Which of these threat actors would be MOST likely to
attack systems for direct financial gain?
A. Organized crime
B. Hacktivist
C. Nation state
D. Competitor
Answer explanation
The Answer: A. Organized crime
An organized crime actor is motivated by money, and their hacking
objectives are usually based around objectives that can be easily exchanged
for financial capital.
The incorrect answers:
B. Hacktivist
A hacktivist is focused on a political agenda and not commonly on a
financial gain.
C. Nation state
Nation states are already well funded, and their primary objective is not
usually based on revenue or income.
D. Competitor
A competitor doesn’t have any direct financial gain by disrupting a
website or stealing customer lists, and often their objective is to disable
a competitor’s business or to harm their reputation. If there is a financial
gain, it would often be an indirect result of an attack.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A9. A security incident has occurred on a file server. Which of
the following data sources should be gathered to address
file storage volatility? (Select TWO)
A. Partition data
B. Kernel statistics
C. ROM data
D. Temporary file systems
E. Process table
Answer explanation
The Answer: A. Partition data and D. Temporary file systems
Both temporary file system data and partition data are part of the file
storage subsystem.
The incorrect answers:
B. Kernel statistics
Kernel statistics are stored in memory.
C. ROM data
ROM data is a type of memory storage.
E. Process table
The process table keeps track of system processes, and it stores this
information in RAM.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A10. An IPS at your company has found a sharp increase
in traffic from all-in-one printers. After researching,
your security team has found a vulnerability associated
with these devices that allows the device to be remotely
controlled by a third-party. Which category would BEST
describe these devices?
A. IoT
B. RTOS
C. MFD
D. SoC
Answer explanation
The Answer: C. MFD
An all-in-one printer that can print, scan, and fax is often categorized as
an MFD (Multifunction Device).
The incorrect answers:
A. IoT
Wearable technology and home automation devices are commonly called
IoT (Internet of Things) devices.
B. RTOS
RTOS (Real-time Operating Systems) are commonly used in
manufacturing and automobiles.
D. SoC
Multiple components that run on a single chip are categorized as an SoC
(System on a Chip).
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A11. Which of the following standards provides information
on privacy and managing PII?
A. ISO 31000
B. ISO 27002
C. ISO 27701
D. ISO 27001
Answer explanation
The Answer: C. ISO 27701
The ISO (International Organization for Standardization) 27701
standard extends the ISO 27001 and 27002 standards to include detailed
management of PII (Personally Identifiable Information) and data privacy.
The incorrect answers:
A. ISO 31000
The ISO 31000 standard sets international standards for risk management
practices.
B. ISO 27002
Information security controls are the focus of the ISO 27002 standard.
D. ISO 27001
The ISO 27001 standard is the foundational standard for Information
Security Management Systems (ISMS).
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A12. Elizabeth, a security administrator, is concerned about
the potential for data exfiltration using external storage
drives. Which of the following would be the BEST way
to prevent this method of data exfiltration?
A. Create an operating system security policy to
prevent the use of removable media
B. Monitor removable media usage in host-based
firewall logs
C. Only allow applications that do not use
removable media
D. Define a removable media block rule in the UTM
Answer explanation
The Answer: A. Create an operating system security policy to prevent
the use of removable media
Removable media uses hot-pluggable interfaces such as USB to connect
storage drives. A security policy in the operating system can prevent any
files from being written to a removable drive.
The incorrect answers:
B. Monitor removable media usage in host-based firewall logs
A host-based firewall monitors traffic flows and does not commonly log
hardware or USB drive access.
C. Only allow applications that do not use removable media
File storage access options are not associated with applications, so it’s not
possible to allow based on external storage drive usage.
D. Define a removable media block rule in the UTM
A UTM (Unified Threat Manager) watches traffic flows across the
network and does not commonly manage the storage options on individual
computers.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
Test para evaluar la personalidad
Quiz
•
Professional Development
25 questions
Vygotsky's Socio-Cultural Theory
Quiz
•
Professional Development
25 questions
Revision- Structure of Language
Quiz
•
Professional Development
25 questions
Circuit Isolation
Quiz
•
Professional Development
25 questions
PREPARACIÓN DE LOS ELEMENTOS VISUALIZANTES
Quiz
•
Professional Development
25 questions
hacking History & Types Basic
Quiz
•
Professional Development
25 questions
Quiz Raker Genap 22-23 Ar Rahmah
Quiz
•
Professional Development
27 questions
Les Figures de Styles
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Education
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development
