Security+ - 03

Security+ - 03

11th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

ASPEK LEGAL TIK XII

ASPEK LEGAL TIK XII

12th Grade

20 Qs

Pengayaan Informatika

Pengayaan Informatika

12th Grade

20 Qs

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

10th - 12th Grade

20 Qs

11° Evaluación bimestral de informática

11° Evaluación bimestral de informática

11th Grade

15 Qs

TIN 11 BÀI 11 KIỂU MẢNG

TIN 11 BÀI 11 KIỂU MẢNG

11th Grade

18 Qs

Начала программирования на языке Паскаль

Начала программирования на языке Паскаль

8th - 11th Grade

15 Qs

Online Platform Block Q

Online Platform Block Q

11th - 12th Grade

20 Qs

City & Guilds Award in Business Processes

City & Guilds Award in Business Processes

12th Grade

20 Qs

Security+ - 03

Security+ - 03

Assessment

Quiz

Instructional Technology, Computers

11th - 12th Grade

Practice Problem

Hard

Created by

Ananda Dwi

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened?

A malicious USB was introduced by an unsuspecting employee.

The ICS firmware was outdated

A local machine had a RAT installed

The HVAC was connected to the maintenance vendor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious actor recently penetrated a company's network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know what was in the memory on the compromised server. Which of the following files should be given to the forensics firm?

Security

Application

Dump

Syslog

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst receives the configuration of a current VPN profile and notices the authentication is only applied to the IP datagram portion of the packet. Which of the following should the analyst implement to authenticate the entire packet?

AH

ESP

SRTP

LDAP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The security administrator isolated the switch on a separate VLAN and set up a patching routine. Which of the following steps should also be taken to harden the smart switch?

Set up an air gap for the switch,

Change the default password for the switch.

Place the switch in a Faraday cage.

Install a cable lock on the switch

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site. upon investigation, a security analyst identifies the following:

1. The legitimate website's IP address is 10.1.1.20 and resolves to this IP.

2. The forged website's IP address appears to be 10.2.12.99, based on NetFlow records.

3. All three to the organization's DNS servers show the website correctly resolves to the legitimate IP.

4. DNS query logs show one of the three DNS servers returned a result of 10.2.12.99 (cached) at the approximate time of the suspected compromise.


Which of the following MOST likely occurred?

A reverse proxy was used to redirect network traffic.

An SSL strip MITM attack was performed

An attacker temporarily poisoned a name server.

An ARP poisoning attack was successfully executed.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the real data?

Data encryption

Data masking

Data deduplication

Data minimization

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator needs to create a RAID configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drives will fail simultaneously. Which of the following RAID configurations should the administrator use?

RAID 0

RAID 1

RAID 5

RAID 10

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?