Search Header Logo

Sec+ Practice Test_7

Authored by Eitan A

Computers

3rd Grade

Sec+ Practice Test_7
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

An employee's company account was used in a data breach. Interviews with the employee revealed:

• The employee was able to avoid changing passwords by using a previous password again.

• The account was accessed from a hostile, foreign nation, but the employee has never traveled to any other countries.

Which of the following can be implemented to prevent these issues from reoccurring? (Select TWO)

Geographic dispersal

Password complexity

Geofencing

Geotagging

Password history

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A system's analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst include in this documentation? (Select two).

The vendor's name

A forensics NDA

The order of volatility

The date and time

The provenance of the artifacts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization recently completed a security control assessment The organization determined some controls did not meet the existing security measures. Additional mitigations are needed to lessen the risk of the non-compliant controls. Which of the following best describes these mitigations?

Corrective

Compensating

Deterrent

Technical

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used to quantitatively measure the criticality of a vulnerability?

CVE

CVSS

CIA

CERT

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A candidate attempts to go to but accidentally visits http://comptiia.org. The malicious website looks exactly like the legitimate website. Which of the following best describes this type of attack?

Reconnaissance

Impersonation

Typosquatting

Watering-hole

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security architect is designing a remote access solution for a business partner. The business partner needs to access one Linux server at the company. The business partner wants to avid managing a password for authentication and additional software installation. Which of the following should the architect recommend?

Soft token

Smart card

CSR

SSH key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company recently suffered a breach in which an attacker was able to access the internal mail servers and directly access several user inboxes. A large number of email messages were later posted online. Which of the following would best prevent email contents from being released should another breach occur?

Implement S/MIME to encrypt the emails at rest.

Enable full disk encryption on the mail servers.

Use digital certificates when accessing email via the web.

Configure web traffic to only use TLS-enabled channels

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?