Ty is reviewing the scan report for a Windows system joined to his organization’s domain and finds the vulnerability shown here. What should be Ty’s most significant concern related to this vulnerability?
Sybex Practice Test 03

Quiz
•
Information Technology (IT)
•
Professional Development
•
Medium
Josh McSwain
Used 3+ times
FREE Resource
43 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The presence of this vulnerability indicates that an attacker may have compromised his
network.
The presence of this vulnerability indicates a misconfiguration on the target server.
The presence of this vulnerability indicates that the domain security policy may be lacking
appropriate controls.
The presence of this vulnerability indicates a critical flaw on the target server that must
be addressed immediately.
Answer explanation
The presence of this vulnerability does indicate a misconfiguration on the targeted server,
but that is not the most significant concern that Ty should have. Rather, he should be alarmed
that the domain security policy does not prevent this configuration and should know that
many other systems on the network may be affected. This vulnerability is not an indicator of
an active compromise and does not rise to the level of a critical flaw.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Heidi runs a vulnerability scan of the management interface of her organization’s virtualization platform and finds the severity 1 vulnerability shown here. What circumstance, if present, should increase the severity level of this vulnerability to Heidi?
Lack of encryption
Missing security patch
Exposure to external networks
Out-of-date antivirus signatures
Answer explanation
This vulnerability has a low severity, but that could be dramatically increased if the
management interface is exposed to external networks. If that were the case, it is possible that an attacker on a remote network would be able to eavesdrop on administrative connections and steal user credentials. Out-of-date antivirus definitions and missing security patches may also be severe vulnerabilities, but they do not increase the severity of this specific
vulnerability. The lack of encryption is already known because of the nature of this vulnerability, so confirming that fact would not change the severity assessment.
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Rowan ran a port scan against a network switch located on her organization’s internal network and discovered the results shown here. She ran the scan from her workstation on the employee VLAN. Which one of the following results should be of greatest concern to her?
Port 22
Port 23
Port 80
Ports 8192 to 8194
Answer explanation
Both ports 22 and 23 should be of concern to Rowan because they indicate that the network switch is accepting administrative connections from a general-use network. Instead, the switch should accept administrative connections only from a network management VLAN. Of these two results, port 23 should be of the greatest concern because it indicates that the switch is allowing unencrypted telnet connections that may be subject to eavesdropping. The results from ports 80 and 8192 to 8194 are of lesser concern because they are being filtered by a firewall.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Evan is troubleshooting a vulnerability scan issue on his network. He is conducting an external scan of a website located on the web server shown in the diagram. After checking the web server logs, he saw no sign of the scan requests. Which one of the following causes is the least likely issue for him to troubleshoot?
The scans are being blocked by an intrusion prevention system.
The scans are being blocked by a rule within the web server application.
The scans are being blocked by a network firewall.
The scans are being blocked by a host firewall.
Answer explanation
All of the scenarios described here could result in failed vulnerability scans and are plausible on this network. However, the fact that the web server logs do not show any denied
requests indicates that the issue is not with the web server application itself. If this were the
case, Evan would see evidence of it in the web server logs.
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Sam is looking for evidence of software that was installed on a Windows system. He believes that the programs were deleted and that the suspect used both registry and log cleaners to hide evidence. What Windows feature can’t he use to find evidence of the use of these programs?
The MFT
Volume shadow copies
The shim (application compatibility) cache
Prefetch files
Answer explanation
The shim cache is used by Windows to track scripts and programs that need specialized
compatibility settings. It is stored in the registry at shutdown, which means that a thorough
registry cleanup will remove program references from it. The master file table (MFT), volume
shadow copies, and prefetch files can all contain evidence of deleted applications.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Mila is evaluating the security of an application developed within her organization. She would like to assess the application’s security by supplying it with invalid inputs. What technique is Mila planning to use?
Fault injection
Stress testing
Mutation testing
Fuzz testing
Answer explanation
Fuzz testing involves sending invalid or random data to an application to test its ability to handle unexpected data. Fault injection directly inserts faults into error-handling paths, particularly error-handling mechanisms that are rarely used or might otherwise be missed during normal testing. Mutation testing is related to fuzzing and fault injection, but rather than changing the inputs to the program or introducing faults to it, mutation testing makes small modifications to the program itself. Stress testing is a performance test that ensures applications and the systems that support them can stand up to the full production load.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A port scan conducted during a security assessment shows the following results. What type of device has most likely been scanned?
--View Image--
A wireless access point
A server
A printer
A switch
Answer explanation
Although TCP ports 21, 23, 80, and 443 are all common ports, 515 and 9100 are commonly associated with printers
Create a free account and access millions of resources
Similar Resources on Quizizz
40 questions
PPPK TEKNIS TIK 7

Quiz
•
Professional Development
40 questions
ACES Technical Quiz 2024

Quiz
•
Professional Development
40 questions
Exam Prep 1

Quiz
•
Professional Development
38 questions
Post Assessment Intune

Quiz
•
Professional Development
42 questions
ई–सृजन (उत्तराखंड) Chatbot QUIZ

Quiz
•
Professional Development
43 questions
SEO vs SEM

Quiz
•
Professional Development
45 questions
Hackathon Behavioral and Technical Questions

Quiz
•
Professional Development
46 questions
PPPK-TEKNIS TIK 2

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade