
SEC+ Practice Questions C-48-C68
Quiz
•
Computers
•
12th Grade
•
Hard
Hasina Hafner
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following BEST describes a risk matrix?
A. A visual summary of a risk assessment
B. Identification of risk at each step of a project plan
C. A list of cybersecurity requirements based on the identified risks
D. Ongoing group discussions regarding cybersecurity
Answer explanation
A. A visual summary of a risk assessment A risk matrix, or risk heat map, is often presented as a graphical chart comparing the likelihood of risk with the consequence. The incorrect answers: B. Identification of risk at each step of a project plan A risk register is a detailed identification and documentation of risk, the application of possible solutions, and ongoing monitoring of the risk at each step of a project. C. A list of cybersecurity requirements based on the identified risks Risk control assessment provides a security administrator with the information needed to build proper security controls for the documented risk. D. Ongoing group discussions regarding cybersecurity Risk awareness involves constant monitoring and analysis of current trends, risks, and response options. This information can be gathered from group discussions, expert presentations, and security conferences and programs. More information: SY0-601, Objective 5.4 - Risk Analysis https://professormesser.link/601050402
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security administrator would like to implement an authentication system that uses cryptographic tickets to validate users. Which of the following would provide this functionality?
A. RADIUS
B. LDAP
C. Kerberos
D. TACACS
Answer explanation
: C. Kerberos Kerberos is a network authentication protocol that provides single sign-on and mutual authentication using cryptographic “tickets” for the behindthe-scenes authentication process. The incorrect answers: A. RADIUS The RADIUS (Remote Authentication Dial-in User Service) authentication protocol is commonly used across many different devices and operating systems, but it does not use cryptographic tickets. B. LDAP LDAP (Lightweight Directory Access Protocol) is another common standard that is often used for authentication, but LDAP does not use cryptographic tickets. D. TACACS TACACS (Terminal Access Controller Access-Control System) is a flexible remote authentication protocol, but it does not use cryptographic tickets during the authentication process. More information: SY0-601, Objective 3.8 - Identity and Access Services https://professormesser.link/601030803
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Richard is reviewing this information from an IPS log: Which of the following can be associated with this log information? (Select TWO)
A. The attacker sent a non-authenticated BGP packet to trigger the IPS
B. The source of the attack is 192.168.11.1
C. The event was logged but no packets were dropped
D. The source of the attack is 10.1.111.7
E. The attacker sent an unusual HTTP packet to trigger the IPS
Answer explanation
The Answer: D. The source of the attack is 10.1.111.7 and E. The attacker sent an unusual HTTP packet to trigger the IPS The second line of the IPS log shows the type of alert, and this record indicates that a suspicious HTTP packet was sent. The last line of the IPS log shows the protocol, destination, and source IP address information. The source IP address is 10.1.111.7. The incorrect answers: A. The attacker sent a non-authenticated BGP packet to trigger the IPS The alert for this IPS log does not indicate any non-authenticated packets or BGP packets. B. The source of the attack is 192.168.11.1 The last line of the log identifies the protocol and IP addresses. The “src” address is the source of the packet and is identified as 10.1.111.7. C. The event was logged but no packets were dropped The first line of the log shows the name of the IPS that identified the issue, the date and time, and disposition. In this log entry, the packet was rejected from IP address 10.1.111.7. More information: SY0-601, Objective 4.3 - Log Files https://professormesser.link/601040303 MAIN_IPS: 22June2019 09:02:50 reject 10.1.111.7 Alert: HTTP Suspicious Webdav OPTIONS Method Request; Host: Server Severity: medium; Performance Impact:3; Category: info-leak; Packet capture; disable Proto:tcp; dst:192.168.11.1; src:10.1.111.7
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company has contracted with a third-party to provide penetration testing services. The service includes a port scan of each externally-facing device. This is an example of:
A. Initial exploitation
B. Escalation of privilege
C. Pivot
D. Active footprinting
Answer explanation
D. Active footprinting Active footprinting sends traffic across the network that can be viewed and/or logged. Performing a port scan will send network traffic to a server, and most port scan attempts can be identified and logged by an IPS. The incorrect answers: A. Initial exploitation An exploit attempt is common when performing a penetration test, but a port scan is not exploiting any vulnerabilities. B. Escalation of privilege If a penetration test is able to exploit a system and obtain a higher level of rights and permissions, then the test is successful at escalating the access privileges. A port scan does not gain access to a system, and it will not provide any privilege escalation. C. Pivot Once a penetration test has exploited a vulnerability and gained access to a system, the tester will use this foothold as a pivot point to access to other devices. Since the inside of the network is usually less secure than the perimeter, this pivot can often provide many more opportunities than the initial exploitation. More information: SY0-601, Objective 1.8 - Reconnaissance https://professormesser.link/601010802
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An access point in a corporate headquarters office has the following configuration: Which of the following would apply to this configuration?
A. Invalid frequency band
B. Weak encryption
C. Incorrect IP address and subnet mask
D. Invalid software version
Answer explanation
The Answer: B. Weak encryption A common issue is weak or outdated security configurations. Older encryptions such as DES and WEP should be updated to use newer and stronger encryption technologies. The incorrect answers: A. Invalid frequency band The 2.4 GHz frequency band is a valid frequency range for 802.11g networks. C. Incorrect IP address and subnet mask None of the listed configuration settings show any issues with the IP address or subnet mask. D. Invalid software version The software version of the access point does not have any configuration options and would not be considered invalid. More information: SY0-601, Objective 1.6 - Vulnerability Types https://professormesser.link/601010601 IP address: 10.1.10.1 Subnet mask: 255.255.255.0 DHCPv4 Server: Enabled SSID: Wireless Wireless Mode: 802.11g Security Mode: WEP-PSK Frequency band: 2.4 GHz Software revision: 2.1 MAC Address: 60:3D:26:71:FF:AA IPv4 Firewall: Enabled
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An application does not properly release unused memory, and eventually it grows so large that it uses all available memory. Which of the following would describe this issue?
A. Integer overflow
B. NULL pointer dereference
C. Memory leak
D. Data injection
Answer explanation
C. Memory leak A memory leak is when a poorly written application allocates memory for use by the application, but then does not release that memory after it is no longer needed. If the application runs on a system for an extended period of time, this memory leak can grow so large that it eventually uses all available memory and crashes the operating system. The incorrect answers: A. Integer overflow An integer overflow attempts to store a large number into a smaller sized memory space. This can sometimes improperly change the value of memory areas that are outside of the smaller space. B. NULL pointer dereference If an application is written to reference a portion of memory, but nothing is currently allocated to that area of memory, a NULL pointer dereference will occur. This can cause the application to crash, display debug information, or create a denial of service (DoS). D. Data injection The unwanted injection of data into a database, library, or any other data flow is an injection attack. An application that does not properly release sections of memory is a badly written application and would not be related to a data injection attack. More information: SY0-601, Objective 1.3 - Other Application Attacks https://professormesser.link/601010310
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is receiving complaints of slowness and disconnections to their Internet-facing web server. A network administrator monitors the Internet link and finds excessive bandwidth utilization from thousands of different IP addresses. Which of the following would be the MOST likely reason for these performance issues?
A. DDoS
B. Wireless jamming
C. MAC cloning
D. Rogue access point
Answer explanation
A. DDoS A DDoS (Distributed Denial of Service) is the failure of a service caused by many different remote devices. In this example, the DDoS is related to a bandwidth utilization exhaustion caused by excessive server requests. The incorrect answers: B. Wireless jamming Wireless jamming is caused by interference of the wireless spectrum. In this example, a wireless network was not part of the web server or any issues associated with the server. C. MAC cloning MAC (Media Access Control) address cloning is when a third-party device changes their MAC address to be the same as another station. In this example, the issue is related to a large number of inbound IP addresses. D. Rogue access point A rogue access point is an unauthorized wireless access point. This issue does not appear to be related to a wireless network. More information: SY0-601, Objective 1.4 - Denial of Service https://professormesser.link/601010410
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
0 questions
SEC+Practice Quiz B27-B48
Quiz
•
0 questions
Sec Review 4
Quiz
•
0 questions
SEC+Practice Quiz B69-B89
Quiz
•
0 questions
Sec+ review
Quiz
•
0 questions
Sec Review 5
Quiz
•
0 questions
SEC+Practice Quiz B49-B69
Quiz
•
0 questions
TestOut ITF Chapter 10
Quiz
•
0 questions
Net Sec I Test Review
Quiz
•
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
55 questions
CHS Holiday Trivia
Quiz
•
12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
