
SEC+ Mod 6 Part 4
Authored by Pat Johnson
Computers
12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
86 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is privilege escalation?
Gaining control of the target system with the privileges of the compromised process.
Increasing the memory capacity of a system.
Enhancing the speed of a network.
Upgrading the operating system to a newer version.
Answer explanation
Privilege escalation is gaining control of the target system with the privileges of the compromised process.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which programming languages offer memory safety features to help prevent buffer overflows?
Python, Java, and C#
HTML, CSS, and JavaScript
PHP, Ruby, and Perl
SQL, NoSQL, and MongoDB
Answer explanation
Python, Java, and C# offer memory safety features to help prevent buffer overflows, making them the correct choices.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a security practice to mitigate buffer overflow vulnerabilities?
Input validation
Boundary checks
Using unsafe functions like strcpy in C/C++
Avoiding the use of unsafe functions
Answer explanation
Using unsafe functions like strcpy in C/C++ is NOT a security practice to mitigate buffer overflow vulnerabilities.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR)?
To enhance the difficulty for attackers attempting to exploit buffer overflows.
To increase the speed of data processing.
To improve the graphical user interface of the operating system.
To reduce the power consumption of the system.
Answer explanation
To enhance the difficulty for attackers attempting to exploit buffer overflows.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT an endpoint hardening technique?
Changing default passwords
Host-based firewalls
Host-based IPSs
Increasing the screen resolution
Answer explanation
Increasing the screen resolution is NOT an endpoint hardening technique as it does not directly contribute to enhancing the security of the endpoint.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do host-based enterprise hardening techniques focus on?
Securing individual endpoints or hosts within an organization's network.
Enhancing the visual appearance of the user interface.
Increasing the storage capacity of servers.
Reducing the number of software applications installed.
Answer explanation
Securing individual endpoints or hosts within an organization's network is the main focus of host-based enterprise hardening techniques.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a fundamental security measure to prevent unauthorized access by changing default settings?
Removing unnecessary software
Disabling unused ports and protocols
Changing default passwords
Implementing host-based firewalls
Answer explanation
Changing default passwords is a fundamental security measure to prevent unauthorized access by ensuring that the initial passwords are not easily guessable.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?