Security+ 701 - Quiz 2

Security+ 701 - Quiz 2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Sec+ Quiz - 1

Sec+ Quiz - 1

Professional Development

15 Qs

VMware Certified Professional - DCV 2V0-21.23

VMware Certified Professional - DCV 2V0-21.23

Professional Development

20 Qs

#01 Security Principle

#01 Security Principle

Professional Development

10 Qs

CompTIA Sec+

CompTIA Sec+

University - Professional Development

20 Qs

MS-102 ADMINISTRATOR MICROSOFT 365

MS-102 ADMINISTRATOR MICROSOFT 365

Professional Development

20 Qs

Activity2

Activity2

Professional Development

15 Qs

Part 4.3

Part 4.3

Professional Development

20 Qs

How are you doing?

How are you doing?

Professional Development

10 Qs

Security+ 701 - Quiz 2

Security+ 701 - Quiz 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Isabella S

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An administrator discovers that some files on a database server were recently encrypted.

The administrator sees from the security logs that the data was last accessed by a domain user. Which of the following best describes the type of attack that occurred?

Insider threat

Social engineering

Watering-hole

Unauthorized attacker

Answer explanation

An insider threat is a type of attack that originates from someone who has legitimate access to an organization's network, systems, or data. In this case, the domain user who encrypted the files on the database server is an example of an insider threat, as they abused their access privileges to cause harm to the organization. Insider threats can be motivated by various factors, such as financial gain, revenge, espionage, or sabotage.

Social engineering: Social engineering involves manipulating individuals into divulging confidential information or performing actions that compromise security. While social engineering attacks can involve insiders, the scenario does not provide evidence of social engineering tactics being used in this specific incident.

Watering-hole: A watering-hole attack involves compromising websites that are frequently visited by the target organization's employees, with the goal of infecting visitors' devices with malware. This scenario does not align with the characteristics of a watering-hole attack, as it involves file encryption on a database server.

Unauthorized attacker: An unauthorized attacker refers to an external individual or entity

attempting to gain unauthorized access to an organization's systems or data. In this scenario, the data was accessed by a domain user, suggesting that the access was not unauthorized from an external perspective.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

While troubleshooting a firewall configuration, a technician determines that a "deny any" policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?

Documenting the new policy in a change request and submitting the request to change

management

Testing the policy in a non-production environment before enabling the policy in the production

network

Disabling any intrusion prevention signatures on the 'deny any' policy prior to enabling the new

policy

Including an 'allow any policy above the 'deny any' policy

Answer explanation

Testing the policy in a non-production environment allows the technician to assess its impact and

ensure that it does not inadvertently block legitimate traffic. This helps to identify and address any

potential issues or conflicts before implementing the policy in the production network, thereby

minimizing the risk of disrupting services or causing downtime.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the best way to secure an on-site data center against intrusion

from an insider?

Bollards

Access badge

Motion sensor

Video surveillance

Answer explanation

To secure an on-site data center against intrusion from an insider, the best measure is to use an access badge system. Access badges control who can enter restricted areas by verifying their identity and permissions, thereby preventing unauthorized access from insiders.

Access badge: Provides controlled and monitored access to restricted areas, ensuring that only authorized personnel can enter.

Bollards: Provide physical barriers to prevent vehicle access but do not prevent unauthorized personnel entry.

Motion sensor: Detects movement but does not control or restrict access.

Video surveillance: Monitors and records activity, but does not physically prevent intrusion.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A cyber operations team informs a security analyst about a new tactic malicious actors are

using to compromise networks. SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?

Digital forensics

E-discovery

Incident response

Threat hunting

Answer explanation

Threat hunting is the process of proactively searching for signs of malicious activity or compromise in

a network, rather than waiting for alerts or indicators of compromise (IOCs) to appear. Threat hunting can help identify new tactics, techniques, and procedures (TTPs) used by malicious actors, as well as uncover hidden or stealthy threats that may have evaded detection by security tools. Threat hunting requires a combination of skills, tools, and methodologies, such as hypothesis generation, data collection and analysis, threat intelligence, and incident response. Threat hunting can also help improve the security posture of an organization by providing feedback and recommendations for security improvements.

Here's a breakdown why the other options are less relevant:

Digital forensics: Digital forensics typically involves investigating a known incident to collect and analyze evidence. While it might be used later if a compromise is confirmed, it's not the initial approach for identifying the new tactic in this scenario.

E-discovery: E-discovery is a legal process for collecting and producing electronic evidence relevant to a legal case. It's not the primary focus for proactively identifying ongoing malicious activity.

Incident response: Incident response is a structured process for handling a confirmed security breach. While it might be triggered if the threat hunt identifies a successful compromise, it's not the initial step for proactive threat detection.

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

A security administrator is reissuing a former employee's laptop. Which of the following is

the best combination of data handling activities for the administrator to perform? (Choose two.)

Data retention

Certification

Destruction

Classification

Sanitization

Answer explanation

The best combination of data handling activities for reissuing a former employee's laptop would be:

Sanitization and Destruction.

Explanation:

● Sanitization: This process involves securely erasing all data on the laptop to ensure that no sensitive or residual data

from the previous user can be recovered or accessed by the new user. This is crucial for maintaining data security

and privacy.

● Destruction: This term is often associated with the permanent removal of data, either by physically destroying

storage media or by securely erasing data in a way that it cannot be recovered. In the context of reissuing a laptop,

"destruction" might refer to securely wiping the storage medium to ensure that no remnants of the previous data

remain.

Other options:

● Data retention: Involves keeping data for a specified period, which is not relevant when reissuing a laptop that

should be wiped clean.

● Certification: Typically involves verifying that a system meets certain standards, which is not directly related to

preparing a laptop for reissue.

● Classification: Involves categorizing data based on its sensitivity, which is more relevant to data management than

preparing a laptop for reuse.

● Enumeration: Refers to identifying and listing resources (like files or directories), which is not directly related to the

secure handling of data when reissuing a device.

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

To improve the security at a data center, a security administrator implements a CCTV

system and posts several signs about the possibility of being filmed. Which of the following best

describe these types of controls? (Select two).

Preventive

Deterrent

Corrective

Directive

Detective

Answer explanation

Explanation:

The CCTV system and signs about the possibility of being filmed serve as both deterrent and detective controls.

Deterrent controls: Aim to discourage potential attackers from attempting unauthorized actions.

Posting signs about CCTV serves as a deterrent by warning individuals that their actions are being monitored.

Detective controls: Identify and record unauthorized or suspicious activity. The CCTV system itself functions as a detective control by capturing and recording footage that can be reviewed later.

Preventive controls: Aim to prevent security incidents but are not directly addressed by the CCTV and signs in this context.

Corrective controls: Aim to correct or mitigate the impact of a security incident.

Directive controls: Provide guidelines or instructions but are not directly addressed by the CCTV and signs.

Compensating controls: Provide alternative measures to compensate for the absence or failure of primary controls.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive

customer data. Which of the following should the administrator do first?

Block access to cloud storage websites.

Create a rule to block outgoing email attachments.

Apply classifications to the data.

Remove all user permissions from shares on the file server.

Answer explanation

Data classification is the process of assigning labels or tags to data based on its sensitivity, value, and risk. Data classification is the first step in a data loss prevention (DLP) solution, as it helps to identify what data needs to be protected and how. By applying classifications to the data, the security administrator can define appropriate policies and rules for the DLP solution to prevent the exfiltration of sensitive customer data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?