CompTIA Security+ SYO-601 Pre-Assessment Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is true for KRI?

A KRI exceeding its normal bounds is not always an indicator of compromise.

In an interview, you were asked to analyze the following statements regarding secure network designs and choose the correct one. Which of the following should you choose?

A NAC examines an endpoint before it can connect to the network, denying access to any device that does not meet specific criteria.

What is a firewall?

A firewall is a network security system that monitors and controls all incoming and outgoing traffic.

Which of the following attacks takes more time?

Brute Force Attack

Your organization is planning to be a part of the CISCP program as a partner. As an information security expert in your company, you are approached by your CEO, who wants to understand how the speed limit of public information centers like CISCP is handled. How should you explain how this speed limit is handled to him?

CISCP implements AIS, which resolves the speed limit issue of public information centers.

In which of the following mobile device deployment models are employees supplied a chosen device paid for by their company for both professional and personal use?

COPE

Which of the following contains the set of rules that govern the operation of a PKI?

Certificate policy (CP)

You are assigned to hunt for traces of a dangerous DNS attack in a network. You need to capture DNS attacks that can compromise DNS replies to all the devices in the network. What type of DNS attack should you look for?

DNS Hijacking

Which feature of a security information and event management (SIEM) tool can help filter multiple alerts detected by different devices for the same event into a single alarm?

Event Duplication

Which of the following is a tool used for making a mirror image backup?

GNU dd

Ramesh is very active on social media. He visits a lot of pages and views a lot of photos. He also uploads most of his photos to social media sites such as Facebook and Instagram. By doing this, he increases the risk of becoming a victim of which of the following?

GPS Tagging

An enterprise's application server and web server are hosted by a cloud service provider, and their database server is in the enterprise's own cloud establishment. Which type of cloud is used by the enterprise?

Hybrid Cloud

Your enterprise ran out of computing resources due to the increasingly high rate of stored data. You are asked to choose a cloud model in which your enterprise can have the most control over the hardware. Which model should you choose?

Infrastructure as a service

You conducted workshops to help train users to identify different risks. What control category does this fall within?

Operational

John needs to identify public key systems that generate different, random public keys for each session and, even if a key gets stolen, should not reveal more than one message. Which public key system should John suggest?

Perfect forward secrecy

Seo-jun is a bug bounty hunter. He was hired by an industrial organization to damage the network's security defenses as much as possible. Seo-jun gained initial access to a system in the network by sending a spear-phishing email into the network that installed a virus. What sequence of actions should he perform to achieve repeated and long-term access to multiple systems in the network with a highly privileged account?

Perform privilege escalation, then lateral movement, and then perform backdoor installation

ABC Manufacturing Company is located in Hiroshima, Japan. Being prone to earthquakes, the company decided to implement a backup of their data on a Singapore server. The IT administrator contacted you to identify the optimal command-line interface protocol for this backup. Which protocol should you advise?

Secure shell

Which of the following denotes a "pass the hash?"

Sending the hash to get authenticated

Your organization has been developing a new product for the last three years. The technical specifications of the product were leaked before the product's official release. As a result of the leak, your company's main competitor is changing the specifications of their own product, releasing it earlier than your product, and planning on acquiring the manufacturer your company uses to create vital digital circuits. News of the competitor's plans has caused the majority of investors to pull their funding from your company. Based on typical commercial data classification levels, which data classification level was breached?

Sensitive

You work in an enterprise that provides various services to other enterprises. After successfully negotiating terms with a new client, you were asked to issue an agreement that specifies the responsibilities of each party and guarantee of services. Which of the following agreements should you issue?

Service-level agreement

A threat actor employed by the victimized organization who purchases and deploys their own devices in the enterprise network is referred to as which of the following?

Shadow IT

Which of the following processes can conceal a file, message, image, or a video within another file, message, image, or a video?

Steganography

Which of the following best defines the recovery point objective?

The maximum tolerable length of time between backups

You are a cybersecurity trainer, and the following are the objectives of an incident response plan listed by a student in a cybersecurity exam. Which of the following is a correct statement?

To contain the spread of the attack

Smith installed new meeting-scheduling software that automatically sends emails and reminders to the recipient's computer. Smith noticed that after installation, the software was also tracking other applications he accessed on his computer. What is this attack called?

Trojan

Sara keeps sensitive data on her work phone, which she frequently uses to make business calls while driving to different client sites. Which of the following actions should Sara take to limit the threat of bluejacking and bluesnarfing attacks on her work phone?

Turn off her phone's Bluetooth connection when she is not using it

Alex works for Alpha Consultancy, where employees are only allowed to use the company's intranet resources using static IT devices connected through a physical network connection. But their clients' teams frequently travel to Alpha Consultancy and require intranet connections for their mobile devices and laptops. One client team has members from various departments who visit at different times. Alex has been told to implement a solution that can be configured for visiting team use while ensuring that these visiting teams can access the intranet without compromising network security. Which of the following protocols should Alex implement?

WPA

Your company's Accounts Payable department reports that an invoice was marked as paid, but the vendor has shown proof they never received any of the $783,296 payment. Accounts Payable confirms that the amount was deducted from the company's accounts, but the recipient account number does not match the vendor's. After an investigation, you discover that the invoice was paid by the Chief Financial Officer. He says he paid the invoice after receiving an after-hours, past-due invoice from the vendor claiming that they would be filing a civil action in court the next morning. Rather than wait for Accounts Payable to come in the next day and verify the invoice date, the CFO immediately paid the full amount. Which type of social engineering attack was your company most likely the victim of?

Whaling

Which of the following tools has a graphical user interface (GUI)?

Wireshark

What is an attack on a NoSQL database compromised by data manipulation when the input is not sanitized by the application?

XML Injection


Conjuntos de estudio relacionados

UN Structure Quiz (Mingst chp. 2-3 + Lecture)

View Set

Лексичний мінімум з англійської ЗНО

View Set

COUN 5002: Assessment in Counseling

View Set