You've hired a third-party to gather information about your company's servers and data. The third-party will not have direct access to your internal network but can gather information from any other source. Which of the following would BEST describe this approach?

SEC+ Quiz1
Quiz
•
Computers
•
11th Grade
•
Easy
Eric Asel
Used 3+ times
FREE Resource
85 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Backdoor testing
Passive footprinting
OS fingerprinting
Partially known environment
Answer explanation
Passive footprinting focuses on learning as much information from open sources such as social media, corporate websites, and business organizations.
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of these protocols use TLS to provide secure communication? (Select TWO)
HTTPS
FTPS
SNMPv2
DNSSEC
SSHTLS
Answer explanation
TLS (Transport Layer Security) is a cryptographic protocol used to encrypt network communication. HTTPS is the Hypertext Transfer Protocol over TLS, and FTPS is the File Transfer Protocol over TLS. An earlier version of TLS is SSL (Secure Sockets Layer). Although we don’t commonly see SSL in use any longer, you may see TLS communication referenced as SSL.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these threat actors would be MOST likely to attack systems for direct financial gain?
Organized crime
Hacktivist
Nation state
Competitor
Answer explanation
An organized crime actor is motivated by money, and their hacking objectives are usually based around objectives that can be easily exchanged for financial capital.
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A security incident has occurred on a file server. Which of the following data sources should be gathered to address file storage volatility? (Select TWO)
Partition data
Kernel statistics
ROM data
Temporary file systems
Process table
Answer explanation
Both temporary file system data and partition data are part of the file storage subsystem.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An IPS at your company has found a sharp increase in traffic from all-in-one printers. After researching, your security team has found a vulnerability associated with these devices that allows the device to be remotely controlled by a third-party. Which category would BEST describe these devices?
IoT
RTOS
MFD
SoC
Answer explanation
An all-in-one printer that can print, scan, and fax is often categorized as an MFD (Multifunction Device).
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following standards provides information on privacy and managing PII?
ISO 31000
ISO 27002
ISO 27701
ISO 27001
Answer explanation
The ISO (International Organization for Standardization) 27701 standard extends the ISO 27001 and 27002 standards to include detailed management of PII (Personally Identifiable Information) and data privacy
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Elizabeth, a security administrator, is concerned about the potential for data exfiltration using external storage drives. Which of the following would be the BEST way to prevent this method of data exfiltration?
Create an operating system security policy to prevent the use of removable media
Monitor removable media usage in host-based firewall logs
Only allow applications that do not use removable media
Define a removable media block rule in the UTM
Answer explanation
Removable media uses hot-pluggable interfaces such as USB to connect storage drives. A security policy in the operating system can prevent any files from being written to a removable drive.
Create a free account and access millions of resources
Similar Resources on Quizizz
86 questions
WJEC GCE Digi Tech - Data
Quiz
•
11th - 12th Grade
80 questions
J277 Unit 1
Quiz
•
11th - 12th Grade
80 questions
KELAS 2-LATIHAN SOAL SAT INFORMATIKA SM2
Quiz
•
2nd Grade - University
84 questions
CCNAv2 mod 10-13 EXAM PRERP
Quiz
•
9th - 12th Grade
84 questions
CCNA Routing & Switching 1-4 EXAM PREP
Quiz
•
9th - 12th Grade
81 questions
CCNAv2 7-9 Exam PREP
Quiz
•
9th - 12th Grade
80 questions
Networking 2 Midterm Study Guide
Quiz
•
9th - 12th Grade
84 questions
Network Security Quiz
Quiz
•
11th Grade
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz
Quiz
•
6th Grade
20 questions
math review
Quiz
•
4th Grade
15 questions
Character Analysis
Quiz
•
4th Grade
12 questions
Multiplying Fractions
Quiz
•
6th Grade
30 questions
Biology Regents Review #1
Quiz
•
9th Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function
Quiz
•
9th - 12th Grade
Discover more resources for Computers
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function
Quiz
•
9th - 12th Grade
20 questions
Taxes
Quiz
•
9th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression
Quiz
•
9th - 12th Grade
14 questions
Attributes of Linear Functions
Quiz
•
9th - 12th Grade
10 questions
Identifying equations
Quiz
•
KG - University
50 questions
Biology Regents Review 2: Ecology
Quiz
•
9th - 12th Grade
20 questions
Investing
Quiz
•
9th - 12th Grade
