
SEC+Practice Quiz B6-B26
Authored by Hasina Hafner
Computers
12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security administrator has performed an audit of the organization’s production web servers, and the results have identified banner information leakage, web services running from a privileged account, and inconsistencies with SSL certificates. Which of the following would be the BEST way to resolve these issues?
A. Server hardening
B. Multi-factor authentication
C. Enable HTTPS
D. Run operating system updates
Answer explanation
: A. Server hardening Many applications and services include secure configuration guides that can assist in hardening the system. These hardening steps will make the system as secure as possible while simultaneously allowing the application to run efficiently. The incorrect answers: B. Multi-factor authentication Although multi-factor authentication is always a good best practice, simply enabling multiple authentication methods would not resolve the issues identified during the audit. C. Enable HTTPS Most web servers will use HTTPS to ensure that network communication is encryption. However, the encrypted network traffic would not correct the issues identified during the audit. D. Run operating system updates Keeping the system up to date is another good best practice, but the issues identified during the audit were not bugs related to the operating systems. All of the issues identified in the audit appear to be related to the configuration of the web server, so any resolution will focus on correcting these configuration issues. More information: SY0-601, Objective 5.2 - Secure Configurations https://professormesser.link/601050203
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A shipping company stores information in small regional warehouses around the country. The company keeps an IPS online at each warehouse to watch for suspicious traffic patterns. Which of the following would BEST describe the security control used at the warehouse?
A. Managerial
B. Compensating
C. Physical
D. Detective
Answer explanation
D. Detective An IPS can detect and record any intrusion attempt. The incorrect answers: A. Managerial Managerial controls would control how people act, such as security policies and standard operating procedures. B. Compensating A compensating control can’t prevent an attack, but it can compensate when an attack occurs. For example, a compensating control would be the re-imaging process or a server restored from backup if an attack had been identified. C. Physical A physical control would block access. For example, a door lock or security guard would be a physical control. More information: SY0-601, Objective 5.1 - Security Controls https://professormesser.link/601050101
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Vice President of Sales has asked the IT team to create daily backups of the sales data. The Vice President is an example of a:
A. Data owner
B. Data protection officer
C. Data steward
D. Data processor
Answer explanation
: A. Data owner The data owner is accountable for specific data, and is often a senior officer of the organization. The incorrect answers: B. Data protection officer The data protection officer (DPO) is responsible for the organization's data privacy. The DPO commonly sets processes and procedures for maintaining the privacy of data. C. Data steward The data steward manages access rights to the data. In this example, the IT team would be the data steward. D. Data processor The data processor is often a third-party that processes data on behalf of the data controller. More information: SY0-601, Objective 5.5 - Data Roles and Responsibilities https://professormesser.link/601050504
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security engineer is preparing to conduct a penetration test. Part of the preparation involves reading through social media posts for information about a third-party website. Which of the following describes this practice?
A. Partially known environment
B. OSINT
C. Exfiltration
D. Active footprinting
Answer explanation
B. OSINT OSINT (Open Source Intelligence) describes the process of obtaining information from open sources, such as social media sites, corporate websites, online forums, and other publicly available locations. The incorrect answers: A. Partially known environment A partially known environment test describes how much information the attacker knows about the test. The attacker may have access to some information about the test, but not all information is disclosed. C. Exfiltration Exfiltration describes the theft of data by an attacker. D. Active footprinting Active footprinting would show some evidence of data gathering. For example, performing a ping scan or DNS query wouldn’t exploit a vulnerability, but it would show that someone was gathering information. More information: SY0-601, Objective 1.8 - Reconnaissance https://professormesser.link/601010802
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company would like to automate their response when a virus is detected on company devices. Which of the following would be the BEST way to implement this function?
A. Active footprinting
B. IaaS
C. Vulnerability scan
D. SOAR
Answer explanation
D. SOAR SOAR (Security Orchestration, Automation, and Response) provides security teams with integration and automation of processes and procedures. The incorrect answers: A. Active footprinting Active footprinting will gather information about a system, but it does not provide any ongoing monitoring or response features. B. IaaS IaaS (Infrastructure as a Service) is a type of cloud service that provides the basic hardware required to install an OS and application. IaaS does not provide ongoing monitoring for security events or automation features. C. Vulnerability scan A vulnerability scan will identify any known vulnerabilities that may be associated with a system. However, a vulnerability scan will not identify real-time infections or automate the response. More information: SY0-601, Objective 4.4 - Security Configurations https://professormesser.link/601040402
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user in the accounting department has received an email from the CEO requesting payment for a recently purchased tablet. However, there doesn't appear to be a purchase order associated with this request. Which of the following would be the MOST likely attack associated with this email?
A. Spear phishing
B. Watering hole attack
C. Invoice scam
D. Credential harvesting
Answer explanation
C. Invoice scam Invoice scams attempt to take advantage of the miscommunication between different parts of the organization. Fake invoices are submitted by the attacker, and these invoices can sometimes be incorrectly paid without going through the expected verification process. The incorrect answers: A. Spear phishing Spear phishing is a directed attack that attempts to obtain private or personal information. In this example, the result was to obtain payment and not to gather private information. B. Watering hole attack A watering hole attack requires users to visit a central website or location. This example did not require the user to visit any third-party websites. D. Credential harvesting Credential harvesting attempts to transfer password files and authentication information from other computers. More information: SY0-601, Objective 1.1 - Other Social Engineering Attacks https://professormesser.link/601010109
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company has been informed of a hypervisor vulnerability that could allow users on one virtual machine to access resources on another virtual machine. Which of the following would BEST describe this vulnerability?
A. Containerization
B. Service integration
C. SDN
D. VM escape
Answer explanation
D. VM escape A VM (Virtual Machine) escape is a vulnerability that allows communication between separate VMs. The incorrect answers: A. Containerization Containerization is an application deployment architecture that uses a self-contained group of application code and dependencies. Many separate containers can run on a single system B. Service integration Service Integration and Management (SIAM) allows the integration of many different service providers into a single management system. This simplifies the application management and deployment process when using separate cloud providers. C. SDN SDN (Software-Defined Networking) separates the control plane of networking devices from the data plane. This allows for more automation and dynamic changes to the infrastructure. More information: SY0-601, Objective 2.2 - Virtualization Security https://professormesser.link/601020205
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Basic of Computer and Network
Quiz
•
8th Grade - University
20 questions
2324tx6
Quiz
•
9th - 12th Grade
20 questions
QUIZ BAB 4: SISTEM OPERASI
Quiz
•
8th Grade - University
25 questions
TIK01
Quiz
•
12th Grade
20 questions
Network topologies
Quiz
•
8th Grade - University
20 questions
Introducción a las bases de datos
Quiz
•
12th Grade
16 questions
Se liga - 1 - 6° anos
Quiz
•
6th Grade - University
20 questions
Sains Komputer Tingkatan 5 - 1.3.1 Menerangkan get logik
Quiz
•
1st Grade - Professio...
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Factor Quadratic Expressions with Various Coefficients
Quiz
•
9th - 12th Grade
18 questions
Success Strategies
Quiz
•
9th - 12th Grade
10 questions
Valentine's Day Trivia
Quiz
•
9th - 12th Grade