Search Header Logo

Comptia sec plus part 5

Authored by Breanna Norton

Other

12th Grade

Used 5+ times

Comptia sec plus part 5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

79 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks is used to capture the WPA2 handshake?

Replay

IV

Evil twin

Dissociation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security engineer is looking to purchase a fingerprint scanner to improve the security of a datacenter. Which of the following scanner characteristics is the MOST critical to successful implementation?

Low false rejection rate

High false rejection rate

High false acceptance rate

Low crossover error rate

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system uses an application server and database server. Employing the principle of least privilege, only database administrators are given administrative privileges on the database server, and only application team members are given administrative privileges on the application server Audit and log file reviews are performed by the business unit (a separate group from the database and application teams). The organization wants to optimize operational efficiency when application or database changes are needed, but it also wants to enforce least privilege, prevent modification of log files, and facilitate the audit and log review performed by the business unit. Which of the following approaches would BEST meet the organization’s goals?

Restrict privileges on the log file directory to “read only” and use a service account to send a copy of these files to the business unit.

Switch administrative privileges for the database and application servers. Give the application team administrative privileges on the database servers and the database team administrative privileges on the application servers.

Give the business unit administrative privileges on both the database and application servers so they can independently monitor server activity.

Remove administrative privileges from both the database and application servers, and give the business unit “read only” privileges on the directories where the log files are kept.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst runs the following command: netstat –anb :

Based on the above information, with which of the following types of malware is the server MOST likely infected?

Worm

RAT

Keylogger

Adware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator if researching ways to improve the security of a manufacturing company’s systems within the next three to six months. Which of the following would provide the security administrator with the MOST diverse perspective?

Platform-specific security benchmark for the company’s specific systems

Manufacturing security auditing requirements

Academic security research on emerging technologies

Security regulations from other industry verticals

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a risk assessment, results show that a fire in one of the company’s datacenters could cost up to $20 million in equipment damages and lost revenue. As a result, the company insures the datacenter for up to $20 million in damages for the cost of $30,000 a year. Which of the following risk response techniques has the company chosen?

Transference

Avoidance

Mitigation

Acceptance

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization’s help desk is flooded with phone calls from users stating they can no longer access certain websites. The help desk escalates the issue to the security team, as these websites were accessible the previous day. The security analysts run the following command ipconfig /flushdns, but the issue persists. Finally, an analyst changes the DNS server for an impacted machine, and the issue goes away. Which of the following attacks MOST likely occurred on the original DNS server?

DNS cache poisoning

Domain hijacking

Distributed denial-of-service

DNS tunneling

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?