Security+ Practice Test #4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Jamario, a network technician at Kelly Innovations LLC, is setting up a new server. He wants to ensure that users can access unencrypted web pages on the server and transfer files to and from it. Jamario should ensure which of the following ports are open? (Select TWO.)

21 (FTP)

Jamario, a network technician at Kelly Innovations LLC, is setting up a new server. He wants to ensure that users can access unencrypted web pages on the server and transfer files to and from it. Jamario should ensure which of the following ports are open? (Select TWO.)

80 (HTTP)

Which of the following is MOST indicative of a voice call threat?

A caller posing as tech support to obtain passwords.

As a network administrator responsible for evaluating a company's encryption protocol method for wireless devices, you have discovered that the company is currently utilizing a deprecated encryption protocol that poses a significant security threat. Which of the following is the MOST appropriate encryption protocol?

AES

Which of the following cryptographic techniques uses the same key for both encryption and decryption processes, making it essential that the key remains secret and is shared securely among the involved parties?

AES

Which of the following BEST describes the action taken when a file is quarantined during an alert response?

Access to the original file is denied to the user.

Which of the following statements BEST explains the Acquisition as part of the incident response activities?

Acquisition involves obtaining a clean copy of the data from a device so it can be used as evidence.

Which of the following terms refers to a list that explicitly grants access or permissions to specific entities, while all others are implicitly denied?

Allow list

Which of the following statements BEST explains the function of an Exposure Factor in the context of vulnerability management?

An exposure factor measures the likelihood of a vulnerability being exploited.

Which aspect of security alerting and monitoring is focused on ensuring that specific software solutions, such as databases or CRM tools, are functioning securely and are not compromised by external threats?

Applications Monitoring

Before implementing a change in the organization's critical infrastructure, it's essential to ensure the proposed modification is assessed, reviewed, and authorized. Which process ensures that these steps are followed?

Approval process

Cheryl's job at Kelly Innovations LLC involves maintaining a record of all company-owned smartphones. Which of the following is MOST likely to be Cheryl's role at Kelly Innovations?

Asset Inventory Manager

Nicola, an IT manager, is considering an encryption method that uses public and private keys for encryption and decryption. What type of encryption is being considered?

Asymmetric encryption

Henry is leading his company in developing risk strategies. Fred has proposed they expand into the growing social media market. The market has a high risk, high reward profile, but it will be difficult to break into the current market. Henry suggests that they wait and see if the market changes and becomes easier to enter. Which risk strategy is Henry using?

Avoid

LunarSoft, a global software company, is redesigning its remote work infrastructure. Employees complain that logging into company systems requires remembering too many passwords, causing inefficiencies. The company's new solution allows employees to log in using their face or fingerprint. What passwordless approach has LunarSoft incorporated?

Biometric authentication.

Which of the following motivations refers to the act of threatening to expose someone's secrets unless they comply with certain demands?

Blackmail

Which system offers a consistent and standardized method for naming and referring to specific publicly known security vulnerabilities and exposures in software and systems?

CVE

Which of the following best describes a governance model where decision-making authority is restricted to a few individuals at the top of the organizational hierarchy?

Centralized governance

When implementing a virtualization solution, which of the following considerations is essential to ensure that the virtual machines have sufficient resources to perform tasks efficiently?

Compute

Which US act requires federal agencies to develop security policies for computer systems that process confidential information?

Computer Security Act (1987)

Which of the following statements is NOT true about the importance of continuous integration in relation to secure operations?

Continuous integration may slow down the development process but it provides far more secure systems overall.

Enrique, the IT head at Dion Consultants, received frantic calls from multiple departments. Users reported that their crucial files were encrypted and they were seeing a countdown timer. The message accompanying the timer indicated that unless a certain amount in cryptocurrency was transferred to a specific address before the countdown ended, the decryption key would be destroyed permanently. Which form of malware has MOST likely targeted Dion Consultants?

Crypto-malware ransomware

A company's cloud environment is compromised and sensitive data is stolen. Upon investigation, it is discovered that an attacker was able to exploit a vulnerability in the encryption used to protect data in transit. Which of the following is the MOST likely cause of this issue?

Cryptographic vulnerability

Photographers at a media company often upload high-resolution images which must be protected from unauthorized modifications and redistribution. Which security measure is BEST to implement for these images?

DRM

In the realm of systems and data management, who is primarily responsible for determining the classification of data and ensuring it aligns with organizational policies?

Data Owner

Which of the following statements regarding data retention in the disposal process is NOT true?

Data retention implies storing all data indefinitely as it might be needed at some point.

Which of the following statements BEST explains the importance of E-discovery in incident response?

E-discovery involves examining drivers to find data that is electronically stored to use them for evidence.

As organizations grow and expand their digital operations, how can automation and orchestration assist in maintaining security posture?

Enables consistent security standards during scaling.

In the process of deploying a new software application within Kelly Innovations LLC, the IT team identified that a certain module wouldn't function unless another software was already installed. Which of the following BEST describes this situation?

Encountering a software dependency.

Which of the following is a hardware vulnerability that relates to using devices or components that are no longer supported by the manufacturer, possibly leading to unpatched security risks?

End-of-life vulnerability

A healthcare organization wants to ensure that patient medical records, which include personal information and health histories, are kept confidential when transmitted between facilities. Which of the following techniques would be the MOST effective in safeguarding this data during transmission?

End-to-end encryption

What is the primary responsibility of a data custodian in the realm of data governance?

Enforces security controls for the safe transport and storage of data.

Given that cloud architecture provides dynamic resource allocation, which of the following security considerations is MOST critical when dealing with the compute component?

Ensuring isolation between different instances.

Sasha, an IT manager at Dion Training, has taken the recently formulated security policies and started conducting training sessions for the employees. She's also distributed awareness materials and set up monitoring tools to gauge the program's effectiveness. Which phase of security awareness practices is Sasha in?

Execution

Local regulations for financial corporations have led Milieu Solutions, an investment company, to consider many security options. A new regulation requires more exacting controls over system responses to errors. To provide maximum protection of client assets, Milieu Solutions has decided to implement a solution that will shut down transactions if network errors occur. Which of the following BEST describes the solution they have implemented?

Fail-closed

Kelly Innovations LLC has implemented a firewall to secure its mission-critical financial system. Given that any downtime would result in substantial financial losses, which failure mode should the firewall be set to if it experiences a malfunction?

Fail-open

Which of the following terms is used to describe a situation where a security system or tool incorrectly flags an action or event as malicious or harmful, even though it's actually benign?

False positive

Dion Training Solutions has partnered with several smaller companies. They set up a system allowing employees from any company to access resources from another partner company without requiring a separate username and password. This is an example of:

Federation

In a compliance workshop at Dion Training, a team is discussing the ramifications of not adhering to industry standards and data protection laws. Which of the following outcomes of non-adherence would result in Dion Training having to pay money?

Fines

Which of the following BEST describes a process used to identify differences between the current state of a system and its desired future state?

Gap analysis

What type of the threat actor is motivated by beliefs about politics and often targets organizations they disagree with?

Hacktivists

Emily, the network security administrator, noticed an unexpected surge in network traffic late at night. She suspects that this could be malicious activity. Which of the following controls should Emily rely on MOST to detect and respond to this potential security incident?

IDS/IPS

Last month at Kelly Innovations LLC, Jamario reported receiving inappropriate images while researching industry competitors. To prevent employees from accidentally accessing such media in the future, which of the following solutions would be MOST effective?

Implementing content categorization.

Angel, a system administrator, notices that several user accounts have been locked out due to multiple failed login attempts in a short span of time. She also observes that the source IP addresses for these attempts are from different countries. Which of the following indicators of malicious activity is MOST likely present in this scenario?

Impossible travel

You are a system administrator for a small business that uses several laptops and desktops for its daily operations. You want to use a mitigation technique that can help you protect these systems from various types of attacks by installing software that can provide security functions such as antivirus, firewall, anti-malware, etc. Which of the following mitigation techniques can help you achieve this goal?

Installation of endpoint protection

At Dion Training, promoting security awareness is paramount. To fortify organizational data protection, what should Dion Training do to uphold and enhance password management best practices?

Instruct users to create strong, unique passwords for each account.

Which of the following backup methods involves real-time replication of every transaction made within a system?

Journaling

Reason and Rhyme, a tutoring service, has increased the security of its customers' passwords. They have always converted passwords to fixed length sequences, but now they will do this process more than once to increase the amount of computing power and time it will take for an attacker to decode the password. What is this method known as?

Key Stretching

To ensure that critical encryption keys are available for recovery in case of emergencies, Kelly Innovations LLC has stored a copy of these keys with a trusted third party. Which cryptographic solution is Kelly Innovations LLC using?

Key escrow

Martin recently noticed something odd about his personal laptop. He had just typed out a lengthy password for a new online service he was signing up for. Later that day, while he was checking his email, he found a suspicious message seemingly containing the exact same password he had typed earlier, with a message that read, "Is this your password?". Troubled, he delved into his computer's activities but couldn't find any unusual software running. Which of the following types of malware is MOST likely responsible for capturing and transmitting Martin's password?

Keylogger

Which of the following terms is used to describe the probability or frequency of a risk occurring in a given time frame?

Likelihood

As a software engineer, Kevin often writes and tests various scripts for automation. One day, he noticed one of his critical scripts failed to execute. Upon closer inspection, Kevin found that the script had been modified to contain a dormant code segment set to activate at a specific date and time. Worried, he scanned through other scripts and found similar modifications. Which type of malware has MOST likely infected Kevin's scripts?

Logic Bomb

Which statement BEST captures the role of the Policy Administrator within the Zero Trust paradigm?

Manages and updates security policies for access control.

Which of the following is a type of security incident that involves unauthorized disclosure of sensitive data due to insecure settings in systems?

Misconfiguration

Which of the following statements BEST explains the importance of considering single points of failure?

Mitigating single points of failure is crucial to maintain the availability and reliability of automated security operations.

When aiming to limit access between different parts of a network to reduce the potential impact of compromised systems, which activity is MOST directly applied?

Network segmentation

Which of the following network designs involves using air-gapping, disconnecting cables, or locking devices to prevent unauthorized access or interference?

Physical isolation

While conducting a routine system audit at Kelly Innovations LLC, Enrique, a senior IT administrator, stumbled upon a startling discovery. He found that Jamario, a junior database analyst whose responsibilities typically revolved around running simple queries and generating weekly reports, suddenly had permissions to modify core database structures, including adding and removing tables. Further analysis revealed that these permissions weren't granted through the company's formal access control procedure. Enrique suspected an external intervention that could have allowed Jamario's account to bypass the standard role-based permissions. This is an example of:

Privilege escalation

Which of the following terms BEST describes the measurement used to describe a 7% possibility of hardware failure in the next year based on past statistical data?

Probability

What part of a BPA for mission essential functions provides a detailed, step-by-step description of the procedural tasks performed?

Process flow

After a security audit, Kelly Innovations LLC decided to dispose of several old hard drives containing sensitive data. They wish to employ a method that ensures the data on these drives is completely unrecoverable. Sasha suggests hitting the drives with a hammer. Given that this is not the most effective solution, which of the following is the BEST method to use?

Pulverizing with industrial machinery

Jeremy, the CEO of Hooli, wants to gauge the financial implications of specific risks tied to the company's IT infrastructure. He has directed his team to create a list of possible incidents that could occur. Then he directed them to look at both the likelihood that an incident will occur and the potential economic, business, and resource fallout if the incident occurs to create a numerical score for each. Which of the following risk assessment methods has Jeremy directed his team to use?

Quantitative risk analysis

Which of the following terms specifically represents the target duration for recovering IT and business operations after a disruptive event?

RTO

A security analyst is investigating a malware incident and finds that the malware has encrypted the data or files on the system and demands money for their decryption or restoration. Which of the following types of malware is MOST likely involved in this incident?

Ransomware

Which of the following terms refers to entities that establish and enforce security standards, regulations, and guidelines across specific sectors such as finance and healthcare?

Regulatory agencies

Which of the following statements BEST explains the importance of Root Cause Analysis in incident response?

Root Causes Analysis helps to understand how the incident occurred and how to prevent similar incidents in the future.

Which of the following email security techniques specifically utilizes email certificates to authenticate and safeguard email content?

S/MIME

Dark Sky Technologies has hired a vendor to develop a custom software solution for their accounting department. They need a document that provides detailed instructions and requirements for the software development project that will include features the software should have, when the work must finished, and other essential details. Which document would best meet Dark Sky's needs?

SOW

Which of the following types of threat actors are the least likely to have extensive knowledge of their target and hacking techniques? (Select TWO.)

Script kiddie

Which of the following tools is MOST known for agentless security monitoring/alerting?

Security Information and Event Management (SIEM)

Dion Training is establishing a security architecture that requires distinct levels of access, such as differentiating between employee and guest access and ensuring only authorized personnel can access sensitive data. Which of the following infrastructure designs is being implemented?

Security zones

Which of the following network technologies separates the control plane from the data plane, allowing for more flexibility and automation in network management?

Software-defined networking

Oliver travels frequently for work. His organization wants to implement an additional authentication method that considers his geographic location before granting access to sensitive systems. Which factor of multifactor authentication is the organization planning to use?

Somewhere you are

What is the name of the web-based attack that involves entering malicious code into user input fields that are executed by a database server?

Structured Query Language injection

Kelly Innovations LLC has observed that their network devices are receiving communication requests that require secure and private interactions, originating from unidentified sources. The IT department hasn't identified similar requests on other parts of the network. Which would be the MOST secure method to ensure private communication among these devices?

TLS

Which of the following MOST accurately describes a reason for implementing a data retention policy?

They ensure compliance with legal and regulatory requiremnets.

Which of the following BEST describes the primary objective of an integrated penetration test?

To assess vulnerabilities across physical, software, and network layers.

Which of the following objectives is primarily fulfilled by using questionnaires during vendor assessments?

To obtain detailed insights into the vendor's security posture and risk management.

The Frozen Dish, a home food delivery service, is reviewing their security systems. Royston, an IT manager, has explained the PKI system to his boss. His boss is alarmed by the idea of public keys and wants to purchase a storage device to save symmetric and asymmetric keys. Royston has explained that the Windows-based devices they use have this type of storage embedded in the motherboards. What is the name of the device that Royston is referring to?

Trusted Platform Module (TPM)

Which of the following provides short-term emergency power to a device when the input power source fails, allowing for either proper system shutdown or switching to a long-term power source?

UPS

Which of the following types of threat actors are the least likely to have extensive knowledge of their target and hacking techniques? (Select TWO.)

Unskilled attacker

Dizzy Crows, a technology company, has experienced a series of sophisticated cyberattacks targeting their endpoints. To improve its endpoint security, the company has decided to implement Endpoint Detection and Response (EDR) capabilities across its network. Which of the following choices BEST explains Dizzy Crows would implement Endpoint Detection and Response (EDR) in the given scenario?

Using EDR provides advanced behavioral analysis and threat intelligence to detect and respond to cyber threats on endpoints.

Dion Training is concerned with protecting data in as it moves from Dion's computers to its cloud servers. Which of the following BEST describes the primary method to secure data when it is being transmitted over a network?

Using transport encryption protocols like IPSec.

Log Cabin Bank has recently expanded its services by purchasing several other banks. They now face security challenges that they haven't faced before. The most significant challenge is providing the type of secure communication among the branches of the bank. State banking regulations require that all communications be secure even when traveling across unsecured networks. Which of the following will provide the Best solution to the challenge faced by Log Cabin Bank.

VPN

Which of the following BEST represents a primary goal when seeking evidence of internal audits from a third-party vendor?

Verification of compliance with internal security standards.

An organization has recently decided to utilize multiple operating systems and applications on a single physical server to optimize resource usage and reduce costs. Which of the following BEST represents this approach?

Virtualization

An attacker uses a phone call to impersonates a bank representative in order to gather sensitive customer information. Which of the following threat vectors does this describe?

Vishing

Kelly Innovations LLC is seeking a solution to encrypt a virtual disk drive that contains archived financial data without encrypting the entire physical disk. Which encryption level would be BEST for this requirement?

Volume encryption

Dion Training is planning to expand its online services, including launching multiple subdomains for different courses. They want a single certificate that can secure all these subdomains. Which type of certificate should Dion Training consider?

Wildcard certificate

Which of the following statements BEST explains the importance of the workforce multiplier?

Workforce multiplier enables organizations to rapidly scale their security capabilities using a combination of human and automated resources.

A security researcher discovers a new vulnerability in an operating system that allows an attacker to execute arbitrary code with elevated privileges. He reports the vulnerability to the vendor and the vendor releases a patch. What type of vulnerability is did the researcher find?

Zero-day

Which of the following refers to a vulnerability in software that is unknown to the vendor and often exploited by malicious actors before a patch is released?

Zero-day


Kaugnay na mga set ng pag-aaral

UNIT 2 - (ch. 5-8), Chp 5-7 Exam Review

View Set

HW3: Homework - Ch. 3: Supply and Demand

View Set

Comprehensive Online Practice 2020 review questions

View Set

Employee behavior and motivation

View Set