
Security+ Quiz week 1

Quiz
•
Computers
•
Professional Development
•
Hard
Yuvraj Niroula
Used 3+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?
Hacktivist
Whistleblower
Organized crime
Unskilled attacker
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is used to add extra complexity before using a one-way data transformation algorithm?
Key stretching
Data masking
Steganography
Salting
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a “page not found” error message. Which of the following types of social engineering attacks occurred?
Brand impersonation
Pretexting
Typosquatting
Phishing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10.50.10.25. Which of the following firewall ACLs will accomplish this goal?
Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53
Access list outbound deny 10.50.10.25/32 0.0.0.0/0 port 53
Access list outbound permit 0.0.0.0/0 10.50.10.25/32 port 53
Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53
Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53
Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53
Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?
SSO
LEAP
MFA
PEAP
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following scenarios describes a possible business email compromise attack?
An employee receives a gift card request in an email that has an executive’s name in the display field of the email.
Employees who open an email attachment receive messages demanding payment in order to access files.
A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.
An employee receives an email with a link to a phishing site that is designed to look like the company’s email portal.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?
Jump server
RADIUS
HSM
Load balancer
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
ITF - Quiz 7.4 - Graphic Device Interfaces

Quiz
•
Professional Development
15 questions
Part 5.3

Quiz
•
Professional Development
10 questions
Soal Perangkat Keras Komputer

Quiz
•
1st Grade - Professio...
10 questions
CCNA TEST 2

Quiz
•
Professional Development
8 questions
Remote Server Terbaru

Quiz
•
Professional Development
15 questions
ITF - Quiz 5.1 - Selecting a Computer

Quiz
•
Professional Development
15 questions
Network & Securiy

Quiz
•
Professional Development
10 questions
8255 PPI

Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade