SEC+Practice Quiz B69-B90

SEC+Practice Quiz B69-B90

12th Grade

22 Qs

quiz-placeholder

Similar activities

SEC+Practice Quiz B27-B48

SEC+Practice Quiz B27-B48

Security 1

Security 1

Sec+ review

Sec+ review

Net Sec I Test Review

Net Sec I Test Review

MS Unit 4 Review

MS Unit 4 Review

SEC+Practice Questions C72-C92

SEC+Practice Questions C72-C92

EOC review Day 1

EOC review Day 1

Chapter 12 & 13 Checkpoint

Chapter 12 & 13 Checkpoint

SEC+Practice Quiz B69-B90

SEC+Practice Quiz B69-B90

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Hasina Hafner

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

. A security administrator is updating the network infrastructure to support 802.1X authentication. Which of the following would be the BEST choice for this configuration?

A. LDAP

HTTPS

C. SNMPv3

D. MS-CHAP

Answer explanation

A. LDAP LDAP (Lightweight Directory Access Protocol) is a common protocol to use for centralized authentication. Other protocols such as RADIUS, TACACS+, or Kerberos would also be valid options for 802.1X authentication. The incorrect answers: B. HTTPS HTTPS (Hypertext Transfer Protocol Secure) is commonly used to encrypt web server communication. HTTPS is not an authentication protocol. C. SNMPv3 SNMPv3 (Simple Network Management Protocol version 3) is used to manage servers and infrastructure devices. SNMP is not an authentication protocol. D. MS-CHAP MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) was commonly used to authenticate devices using Microsoft’s Point-toPoint Tunneling Protocol (PPTP). Security issues related to the use of DES (Data Encryption Standard) encryption in MS-CHAP eliminate it from consideration for modern authentication. More information: SY0-601, Objective 3.4 - Wireless Authentication Protocols https://professormesser.link/601030403

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

. Your company owns a purpose-built appliance that doesn’t provide any access to the operating system and doesn't provide a method to upgrade the firmware. Which of the following describes this appliance?

A. End-of-life

B. Weak configuration

C. Improper input handling

D. Embedded system

Answer explanation

D. Embedded system An embedded system usually does not provide access to the OS and may not even provide a method of upgrading the system firmware. The incorrect answers: A. End-of-life A device at its end-of-life is no longer supported by the vendor. In this example, the vendor support status isn’t mentioned. B. Weak configuration A weak configuration would leave the system easily accessible by an attacker. In this example, the described scenario doesn’t describe any weak configurations. C. Improper input handling Improper handling of user input can sometimes result in an exploit. In this example, no specific user input issues were described. More information: SY0-601, Objective 2.6 - Embedded Systems Constraints https://professormesser.link/601020603

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Last month, a finance company disposed of seven-year-old printed customer account summaries that were no longer required for auditing purposes. A recent online search has now found that images of these documents are available as downloadable torrents. Which of the following would MOST likely have prevented this information breach?

Pulping

Degaussing

NDA

Fenced garbage disposal areas

Answer explanation

A. Pulping Pulping places the papers into a large washing tank to remove the ink, and the paper is broken down into pulp and recycled. The information on the paper is not recoverable after pulping. The incorrect answers: B. Degaussing Degaussing removes the electromagnetic field of storage media and electronics. Degaussing will not have any effect on paper items. C. NDA A non-disclosure agreement is only valid to the people who have signed the agreement. In this case, it can be assumed that the papers were obtained by a third-party after being placed in the trash. D. Fenced garbage disposal areas Although a fenced disposal area would have protected this information while it was on-site, the papers could have been obtained once they left the facility. The best choice for this question would be the option that would render the information on the pages unreadable. More information: SY0-601, Objective 2.7 - Secure Data Destruction https://professormesser.link/601020703

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A security manager believes that an employee is using their laptop to circumvent the corporate Internet security controls through the use of a cellular hotspot. Which of the following could be used to validate this belief? (Select TWO)

A. HIPS

B. UTM appliance logs

C. Web application firewall events

D. Host-based firewall logs

E. Next-generation firewall logs

Answer explanation

A. HIPS and D. Host-based firewall logs If the laptop is not communicating across the corporate network, then the only evidence of the traffic would be contained on the laptop itself. A HIPS (Host-based Intrusion Prevention System) and host-based firewall logs may contain information about recent traffic flows to systems outside of the corporate network. The incorrect answers: B. UTM appliance logs A unified threat management appliance is commonly located in the core of the network. The use of a cellular hotspot would circumvent the UTM and would not be logged. C. Web application firewall events Web application firewalls are commonly used to protect internal web servers. Outbound Internet communication would not be logged, and anyone circumventing the existing security controls would also not be logged. E. Next-generation firewall logs Although a next-generation firewall keeps detailed logs, any systems communicating outside of the normal corporate Internet connection would not appear in those logs. More information: SY0-601, Objective 3.2 - Endpoint Protection https://professormesser.link/601030201

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An application developer is creating a mobile device app that will include extensive encryption and decryption. Which of the following technologies would be the BEST choice for this app?

A. AES

B. Elliptic curve

C. Diffie-Hellman

D. PGP

Answer explanation

B. Elliptic curve ECC (Elliptic Curve Cryptography) uses smaller keys than non-ECC encryption and has smaller storage and transmission requirements. These characteristics make it an efficient option for mobile devices. The incorrect answers: A. AES AES (Advanced Encryption Standard) is a useful encryption cipher, but the reduced overhead of elliptic curve cryptography is a better option for this scenario. C. Diffie-Hellman Diffie-Hellman is a key-agreement protocol, and Diffie-Hellman does not provide for any encryption or authentication. D. PGP PGP’s public-key cryptography requires much more overhead than the elliptic curve cryptography option. More information: SY0-601, Objective 2.8 Symmetric and Asymmetric Cryptography https://professormesser.link/601020802

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be a common result of a successful vulnerability scan?

A. A list of usernames and password hashes from a server

B. A list of Microsoft patches that have not been applied to a server

C. A copy of image files from a private file share

D. The BIOS configuration of a server

Answer explanation

B. A list of Microsoft patches that have not been applied to a server A vulnerability scan will identify known vulnerabilities, but it will stop short of exploiting these vulnerabilities. The incorrect answers: A. A list of usernames and password hashes from a server This type of secure information cannot be obtained through a vulnerability scan. C. A copy of image files from a private file share A private file share would prevent any access by unauthorized users, including vulnerability scans. D. The BIOS configuration of a server Private information, such as a device’s BIOS configuration, is not available from a vulnerability scan. More information: SY0-601, Objective 1.7 - Vulnerability Scans https://professormesser.link/601010702

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator is researching an issue with conference room users at a remote site. When connected to the wireless network, users receive an IP address that is not part of the corporate addressing scheme. Communication over this network also appears to have slower performance than the wireless connections elsewhere in the building. Which of the following would be the MOST likely reason for these issues?

A. Rogue access point

B. Domain hijack

C. DDoS

D. MAC flooding

Answer explanation

A. Rogue access point A rogue access point is an unauthorized access point added by a user or attacker. This access point may not necessarily be malicious, but it does create significant security concerns and unauthorized access to the corporate network. The incorrect answers: B. Domain hijack A domain hijacking would be associated with unauthorized access to a domain name. In this example, the wireless IP addressing and performance issues do not appear to be related to a domain hijack. C. DDoS A DDOS (Distributed Denial of Service) would cause outages or slow performance to a service. A DDoS would not commonly modify or update any local IP addresses. D. MAC flooding MAC (Media Access Control) flooding can certainly create performance issues, but the unmatching IP address scheme on the wireless network does not appear to be related to a MAC flood. More information: SY0-601, Objective 1.4 - Rogue Access Points and Evil Twins https://professormesser.link/601010401

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?