
Sec+ Practice Test_7
Authored by Eitan A
Computers
3rd Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
An employee's company account was used in a data breach. Interviews with the employee revealed:
• The employee was able to avoid changing passwords by using a previous password again.
• The account was accessed from a hostile, foreign nation, but the employee has never traveled to any other countries.
Which of the following can be implemented to prevent these issues from reoccurring? (Select TWO)
Geographic dispersal
Password complexity
Geofencing
Geotagging
Password history
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A system's analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst include in this documentation? (Select two).
The vendor's name
A forensics NDA
The order of volatility
The date and time
The provenance of the artifacts
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization recently completed a security control assessment The organization determined some controls did not meet the existing security measures. Additional mitigations are needed to lessen the risk of the non-compliant controls. Which of the following best describes these mitigations?
Corrective
Compensating
Deterrent
Technical
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is used to quantitatively measure the criticality of a vulnerability?
CVE
CVSS
CIA
CERT
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A candidate attempts to go to but accidentally visits http://comptiia.org. The malicious website looks exactly like the legitimate website. Which of the following best describes this type of attack?
Reconnaissance
Impersonation
Typosquatting
Watering-hole
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security architect is designing a remote access solution for a business partner. The business partner needs to access one Linux server at the company. The business partner wants to avid managing a password for authentication and additional software installation. Which of the following should the architect recommend?
Soft token
Smart card
CSR
SSH key
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company recently suffered a breach in which an attacker was able to access the internal mail servers and directly access several user inboxes. A large number of email messages were later posted online. Which of the following would best prevent email contents from being released should another breach occur?
Implement S/MIME to encrypt the emails at rest.
Enable full disk encryption on the mail servers.
Use digital certificates when accessing email via the web.
Configure web traffic to only use TLS-enabled channels
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?