
SEC+Practice Quiz B69-B90
Quiz
•
Computers
•
12th Grade
•
Hard
Hasina Hafner
FREE Resource
Enhance your content in a minute
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
. A security administrator is updating the network infrastructure to support 802.1X authentication. Which of the following would be the BEST choice for this configuration?
A. LDAP
HTTPS
C. SNMPv3
D. MS-CHAP
Answer explanation
A. LDAP LDAP (Lightweight Directory Access Protocol) is a common protocol to use for centralized authentication. Other protocols such as RADIUS, TACACS+, or Kerberos would also be valid options for 802.1X authentication. The incorrect answers: B. HTTPS HTTPS (Hypertext Transfer Protocol Secure) is commonly used to encrypt web server communication. HTTPS is not an authentication protocol. C. SNMPv3 SNMPv3 (Simple Network Management Protocol version 3) is used to manage servers and infrastructure devices. SNMP is not an authentication protocol. D. MS-CHAP MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) was commonly used to authenticate devices using Microsoft’s Point-toPoint Tunneling Protocol (PPTP). Security issues related to the use of DES (Data Encryption Standard) encryption in MS-CHAP eliminate it from consideration for modern authentication. More information: SY0-601, Objective 3.4 - Wireless Authentication Protocols https://professormesser.link/601030403
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
. Your company owns a purpose-built appliance that doesn’t provide any access to the operating system and doesn't provide a method to upgrade the firmware. Which of the following describes this appliance?
A. End-of-life
B. Weak configuration
C. Improper input handling
D. Embedded system
Answer explanation
D. Embedded system An embedded system usually does not provide access to the OS and may not even provide a method of upgrading the system firmware. The incorrect answers: A. End-of-life A device at its end-of-life is no longer supported by the vendor. In this example, the vendor support status isn’t mentioned. B. Weak configuration A weak configuration would leave the system easily accessible by an attacker. In this example, the described scenario doesn’t describe any weak configurations. C. Improper input handling Improper handling of user input can sometimes result in an exploit. In this example, no specific user input issues were described. More information: SY0-601, Objective 2.6 - Embedded Systems Constraints https://professormesser.link/601020603
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Last month, a finance company disposed of seven-year-old printed customer account summaries that were no longer required for auditing purposes. A recent online search has now found that images of these documents are available as downloadable torrents. Which of the following would MOST likely have prevented this information breach?
Pulping
Degaussing
NDA
Fenced garbage disposal areas
Answer explanation
A. Pulping Pulping places the papers into a large washing tank to remove the ink, and the paper is broken down into pulp and recycled. The information on the paper is not recoverable after pulping. The incorrect answers: B. Degaussing Degaussing removes the electromagnetic field of storage media and electronics. Degaussing will not have any effect on paper items. C. NDA A non-disclosure agreement is only valid to the people who have signed the agreement. In this case, it can be assumed that the papers were obtained by a third-party after being placed in the trash. D. Fenced garbage disposal areas Although a fenced disposal area would have protected this information while it was on-site, the papers could have been obtained once they left the facility. The best choice for this question would be the option that would render the information on the pages unreadable. More information: SY0-601, Objective 2.7 - Secure Data Destruction https://professormesser.link/601020703
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A security manager believes that an employee is using their laptop to circumvent the corporate Internet security controls through the use of a cellular hotspot. Which of the following could be used to validate this belief? (Select TWO)
A. HIPS
B. UTM appliance logs
C. Web application firewall events
D. Host-based firewall logs
E. Next-generation firewall logs
Answer explanation
A. HIPS and D. Host-based firewall logs If the laptop is not communicating across the corporate network, then the only evidence of the traffic would be contained on the laptop itself. A HIPS (Host-based Intrusion Prevention System) and host-based firewall logs may contain information about recent traffic flows to systems outside of the corporate network. The incorrect answers: B. UTM appliance logs A unified threat management appliance is commonly located in the core of the network. The use of a cellular hotspot would circumvent the UTM and would not be logged. C. Web application firewall events Web application firewalls are commonly used to protect internal web servers. Outbound Internet communication would not be logged, and anyone circumventing the existing security controls would also not be logged. E. Next-generation firewall logs Although a next-generation firewall keeps detailed logs, any systems communicating outside of the normal corporate Internet connection would not appear in those logs. More information: SY0-601, Objective 3.2 - Endpoint Protection https://professormesser.link/601030201
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An application developer is creating a mobile device app that will include extensive encryption and decryption. Which of the following technologies would be the BEST choice for this app?
A. AES
B. Elliptic curve
C. Diffie-Hellman
D. PGP
Answer explanation
B. Elliptic curve ECC (Elliptic Curve Cryptography) uses smaller keys than non-ECC encryption and has smaller storage and transmission requirements. These characteristics make it an efficient option for mobile devices. The incorrect answers: A. AES AES (Advanced Encryption Standard) is a useful encryption cipher, but the reduced overhead of elliptic curve cryptography is a better option for this scenario. C. Diffie-Hellman Diffie-Hellman is a key-agreement protocol, and Diffie-Hellman does not provide for any encryption or authentication. D. PGP PGP’s public-key cryptography requires much more overhead than the elliptic curve cryptography option. More information: SY0-601, Objective 2.8 Symmetric and Asymmetric Cryptography https://professormesser.link/601020802
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would be a common result of a successful vulnerability scan?
A. A list of usernames and password hashes from a server
B. A list of Microsoft patches that have not been applied to a server
C. A copy of image files from a private file share
D. The BIOS configuration of a server
Answer explanation
B. A list of Microsoft patches that have not been applied to a server A vulnerability scan will identify known vulnerabilities, but it will stop short of exploiting these vulnerabilities. The incorrect answers: A. A list of usernames and password hashes from a server This type of secure information cannot be obtained through a vulnerability scan. C. A copy of image files from a private file share A private file share would prevent any access by unauthorized users, including vulnerability scans. D. The BIOS configuration of a server Private information, such as a device’s BIOS configuration, is not available from a vulnerability scan. More information: SY0-601, Objective 1.7 - Vulnerability Scans https://professormesser.link/601010702
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security administrator is researching an issue with conference room users at a remote site. When connected to the wireless network, users receive an IP address that is not part of the corporate addressing scheme. Communication over this network also appears to have slower performance than the wireless connections elsewhere in the building. Which of the following would be the MOST likely reason for these issues?
A. Rogue access point
B. Domain hijack
C. DDoS
D. MAC flooding
Answer explanation
A. Rogue access point A rogue access point is an unauthorized access point added by a user or attacker. This access point may not necessarily be malicious, but it does create significant security concerns and unauthorized access to the corporate network. The incorrect answers: B. Domain hijack A domain hijacking would be associated with unauthorized access to a domain name. In this example, the wireless IP addressing and performance issues do not appear to be related to a domain hijack. C. DDoS A DDOS (Distributed Denial of Service) would cause outages or slow performance to a service. A DDoS would not commonly modify or update any local IP addresses. D. MAC flooding MAC (Media Access Control) flooding can certainly create performance issues, but the unmatching IP address scheme on the wireless network does not appear to be related to a MAC flood. More information: SY0-601, Objective 1.4 - Rogue Access Points and Evil Twins https://professormesser.link/601010401
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
0 questions
SEC+Practice Quiz B27-B48
Quiz
•
0 questions
Security 1
Quiz
•
0 questions
Sec+ review
Quiz
•
0 questions
Net Sec I Test Review
Quiz
•
0 questions
MS Unit 4 Review
Quiz
•
0 questions
SEC+Practice Questions C72-C92
Quiz
•
0 questions
EOC review Day 1
Quiz
•
0 questions
Chapter 12 & 13 Checkpoint
Quiz
•
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
55 questions
CHS Holiday Trivia
Quiz
•
12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
