SEC+ Quiz1

SEC+ Quiz1

11th Grade

85 Qs

quiz-placeholder

Similar activities

Cybersecurity Acronyms A, C, and D

Cybersecurity Acronyms A, C, and D

9th - 12th Grade

88 Qs

VLAN

VLAN

11th Grade

90 Qs

Core 2 preview

Core 2 preview

9th - 12th Grade

80 Qs

CCNA Routing & Switching 1-4 EXAM PREP

CCNA Routing & Switching 1-4 EXAM PREP

9th - 12th Grade

84 Qs

Variables, Conditionals, & Functions Assessment

Variables, Conditionals, & Functions Assessment

9th - 12th Grade

88 Qs

Network + Study Quiz

Network + Study Quiz

11th Grade

80 Qs

Unit 6:  Algorithms (APCSP '24-'25 code.org)

Unit 6: Algorithms (APCSP '24-'25 code.org)

9th - 12th Grade

85 Qs

cloud computing

cloud computing

9th - 12th Grade

85 Qs

SEC+ Quiz1

SEC+ Quiz1

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Eric Asel

Used 3+ times

FREE Resource

85 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You've hired a third-party to gather information about your company's servers and data. The third-party will not have direct access to your internal network but can gather information from any other source. Which of the following would BEST describe this approach?

Backdoor testing

Passive footprinting

OS fingerprinting

Partially known environment

Answer explanation

Passive footprinting focuses on learning as much information from open sources such as social media, corporate websites, and business organizations.

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of these protocols use TLS to provide secure communication? (Select TWO)

HTTPS

FTPS

SNMPv2

DNSSEC

SSHTLS

Answer explanation

TLS (Transport Layer Security) is a cryptographic protocol used to encrypt network communication. HTTPS is the Hypertext Transfer Protocol over TLS, and FTPS is the File Transfer Protocol over TLS. An earlier version of TLS is SSL (Secure Sockets Layer). Although we don’t commonly see SSL in use any longer, you may see TLS communication referenced as SSL.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these threat actors would be MOST likely to attack systems for direct financial gain?

Organized crime

Hacktivist

Nation state

Competitor

Answer explanation

An organized crime actor is motivated by money, and their hacking objectives are usually based around objectives that can be easily exchanged for financial capital.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A security incident has occurred on a file server. Which of the following data sources should be gathered to address file storage volatility? (Select TWO)

Partition data

Kernel statistics

ROM data

Temporary file systems

Process table

Answer explanation

Both temporary file system data and partition data are part of the file storage subsystem.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An IPS at your company has found a sharp increase in traffic from all-in-one printers. After researching, your security team has found a vulnerability associated with these devices that allows the device to be remotely controlled by a third-party. Which category would BEST describe these devices?

IoT

RTOS

MFD

SoC

Answer explanation

An all-in-one printer that can print, scan, and fax is often categorized as an MFD (Multifunction Device).

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following standards provides information on privacy and managing PII?

ISO 31000

ISO 27002

ISO 27701

ISO 27001

Answer explanation

The ISO (International Organization for Standardization) 27701 standard extends the ISO 27001 and 27002 standards to include detailed management of PII (Personally Identifiable Information) and data privacy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Elizabeth, a security administrator, is concerned about the potential for data exfiltration using external storage drives. Which of the following would be the BEST way to prevent this method of data exfiltration?

Create an operating system security policy to prevent the use of removable media

Monitor removable media usage in host-based firewall logs

Only allow applications that do not use removable media

Define a removable media block rule in the UTM

Answer explanation

Removable media uses hot-pluggable interfaces such as USB to connect storage drives. A security policy in the operating system can prevent any files from being written to a removable drive.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?