SEC+ Mod 6 Part 4

SEC+ Mod 6 Part 4

12th Grade

86 Qs

quiz-placeholder

Similar activities

SOAL X.E

SOAL X.E

10th Grade - University

82 Qs

Level Determination Quiz

Level Determination Quiz

12th Grade

82 Qs

CS1 Midterm

CS1 Midterm

9th - 12th Grade

83 Qs

Final Question Bank 24-25

Final Question Bank 24-25

9th - 12th Grade

81 Qs

Code.org Final Vocabulary

Code.org Final Vocabulary

9th - 12th Grade

90 Qs

HTML Revision 2023

HTML Revision 2023

9th - 12th Grade

85 Qs

Quiz Pengolah Grafis

Quiz Pengolah Grafis

12th Grade

90 Qs

SEC+ Mod 6 Part 4

SEC+ Mod 6 Part 4

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Pat Johnson

FREE Resource

86 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is privilege escalation?

Gaining control of the target system with the privileges of the compromised process.

Increasing the memory capacity of a system.

Enhancing the speed of a network.

Upgrading the operating system to a newer version.

Answer explanation

Privilege escalation is gaining control of the target system with the privileges of the compromised process.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which programming languages offer memory safety features to help prevent buffer overflows?

Python, Java, and C#

HTML, CSS, and JavaScript

PHP, Ruby, and Perl

SQL, NoSQL, and MongoDB

Answer explanation

Python, Java, and C# offer memory safety features to help prevent buffer overflows, making them the correct choices.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a security practice to mitigate buffer overflow vulnerabilities?

Input validation

Boundary checks

Using unsafe functions like strcpy in C/C++

Avoiding the use of unsafe functions

Answer explanation

Using unsafe functions like strcpy in C/C++ is NOT a security practice to mitigate buffer overflow vulnerabilities.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR)?

To enhance the difficulty for attackers attempting to exploit buffer overflows.

To increase the speed of data processing.

To improve the graphical user interface of the operating system.

To reduce the power consumption of the system.

Answer explanation

To enhance the difficulty for attackers attempting to exploit buffer overflows.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an endpoint hardening technique?

Changing default passwords

Host-based firewalls

Host-based IPSs

Increasing the screen resolution

Answer explanation

Increasing the screen resolution is NOT an endpoint hardening technique as it does not directly contribute to enhancing the security of the endpoint.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do host-based enterprise hardening techniques focus on?

Securing individual endpoints or hosts within an organization's network.

Enhancing the visual appearance of the user interface.

Increasing the storage capacity of servers.

Reducing the number of software applications installed.

Answer explanation

Securing individual endpoints or hosts within an organization's network is the main focus of host-based enterprise hardening techniques.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a fundamental security measure to prevent unauthorized access by changing default settings?

Removing unnecessary software

Disabling unused ports and protocols

Changing default passwords

Implementing host-based firewalls

Answer explanation

Changing default passwords is a fundamental security measure to prevent unauthorized access by ensuring that the initial passwords are not easily guessable.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers