Security+ SY0-601

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which tool is most commonly associated with state actors?

Advanced Persistent Threat (APT)

Which of the following is not used to describe those who attack computer systems? A. Hacker B. Malicious agent C. Attacker D. Threat actor

B. Malicious Agent

Which of the following is true regarding the relationship between security and convenience? A. Security and convenience have no relationship. B. Security and convenience are inversely proportional. C. Security and convenience are equal in importance. D. Security is less importance than convenience.

B. Security and convenience are inversely proportional.

What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?

Brokers

Which of the following ensures that only authorized parties can view protected information? A. Integrity B. Authorization C. Confidentiality D. Availibility

C. Confidentiality

Which of the following is not true regarding security? A. Security is a process B. Security is a goal C. Security is a war that must be won at all costs. D. Security includes the necessary steps to protect from harm.

C. Security is a war that must be won at all costs.

Luna is reading a book about the history of cybercrime. She read that the very first cyberattacks that occurred were mainly for what purpose?

Fame

Which of the following is not a recognized attack vector? A. Social media B. On-prem C. Email D. Supply chain

On-prem

Which of the following is not an issue with patching? A. Patches address zero-day vulnerabilities B. Delays in patching OSs C. Few patches exist for application software D. Difficulty patching firmware

Patches address zero-day vulnerabilities

What is the term used to describe the connectivity between an organization and a third party?

System Integration

How do vendors decide which should be the default settings on a system?

Those settings that provide the means by which the user can immediately begin to use the product.

What is an objective of state-sponsored attackers?

To spy on citizens

Which type of hacker will probe a system for weaknesses and then privately provide that information back to the organization?

White hat hackers

Which of the following of the CIA Triad ensures that the information is correct, and no unauthorized person has altered it? A. Integrity B. Confidentiality C. Assurance D. Availability

A. Integrity

Which of the following is not a reason why a legacy platform has not been updated? A. No compelling reasons for any updates B. Limited hardware capacity C. Neglect D. An application only operates on a specific OS version

A. No compelling reason for any updates

Which of the following is false about the CompTIA Security+ certification? A. The Security+ certification is a vendor-neutral credential. B. Professionals who hold the Security+ certification earn about the same or slightly less than security professionals who have not achieved this certification. C. Security+ is one of the most widely acclaimed security certifications. D. Security+ is internationally recognized as validating a foundation level of security skills and knowledge.

B. Professionals who hold the Security+ certification earn about the same or slightly less than security professionals who have not achieved this certification.

Which of the following groups use Advanced Persistent Threats? A. Criminal syndicates B. State actors C. Shadow IT D. Brokers

B. State actors

Which of the following groups have the lowest level of technical knowledge? A. Hacktivists B. Script kiddies C. Insiders D. State actors

Script kiddies

After Bella earned her security certification, she was offered a promotion. As she reviewed the job responsibilities, she saw that in this position she will report to the CISO and will be a supervisor over a group of security technicians. Which of these generally recognized security positions has she been offered?

Security Manager

Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information _____.

through products, people, and procedures on the devices that store, manipulate, and transmit the information


Set pelajaran terkait

Due Process and Right to Privacy

View Set

Community Chapter 11 NCLEX Questions

View Set

Complete Commercial Law (2nd Half)

View Set

Trigonometric Ratios (0, 30, 45, 60, 90, 180, 270)

View Set

Chapter 21 the rise of progressivism

View Set

Network + FInal Exam Practice test Certmaster

View Set

NCLEX-Benign prostatic hypertrophy BPH

View Set

Activity 3.3.7 Analyze the Quest for Human Rights

View Set

Site Safety Chapter 3: Section BC 3302: Definitions

View Set

Biology Sickle-cell and Genes test McGraw-Hill

View Set