SEC+ Study Guide B

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ctstravis
C
Ctstravis
Community Contributor
Quizzes Created: 8 | Total Attempts: 2,492
| Attempts: 106
SettingsSettings
Please wait...
  • 1/100 Questions

    QUESTION NO: 192A user complains that the color laser printer continuously gives an access denied message while attempting to print a text document. The administrator logs onto the PC and prints successfully. Which of the following should the administrator check FIRST?

    • That the printer has the correct size of paper in each of the trays
    • That the toner should be changed in the printer
    • That the user has sufficient rights to print to the printer
    • That the user is attempting to print to the correct printer tray
Please wait...
About This Quiz

Sec+ Study Guide B focuses on enhancing cybersecurity skills, covering secure virtualization, access controls, patch management, and encryption. It prepares technicians for Security+ certification, emphasizing practical security measures and infrastructure protection.

SEC+ Study Guide B - Quiz

Quiz Preview

  • 2. 

    QUESTION NO: 115Which of the following might an attacker resort to in order to recover discarded company documents?

    • Phishing

    • Insider theft

    • Dumpster diving

    • Shoulder surfing

    Correct Answer
    A. Dumpster diving
    Explanation
    Dumpster diving is a method that an attacker might resort to in order to recover discarded company documents. This refers to the act of searching through trash or recycling bins to find valuable information. Attackers may target companies that do not properly dispose of sensitive documents, such as financial records, customer data, or intellectual property. By retrieving these discarded documents, attackers can gain valuable insights or use the information for malicious purposes, such as identity theft or corporate espionage.

    Rate this question:

  • 3. 

    QUESTION NO: 128After registering an email address on a website, a user starts receiving messages from unknown sources. The email account is new, and therefore the user is concerneD. This type of message traffic is referred to as:

    • Instant messagetraffiC.

    • SPIM

    • S/MIME.

    • Spam.

    Correct Answer
    A. Spam.
    Explanation
    After registering an email address on a website, if a user starts receiving messages from unknown sources, it is referred to as spam. Spam refers to unsolicited and unwanted emails that are sent in bulk to a large number of recipients. These messages are often promotional in nature or contain malicious content. In this scenario, the user is concerned because they are receiving messages from unknown sources, indicating that it is spam.

    Rate this question:

  • 4. 

    QUESTION NO: 135Which of the following is the primary purpose of a honeypot?

    • Translate addresses at the perimeter

    • To provide a decoy target on the network

    • Provide cryptography for the network

    • Work as a network proxy

    Correct Answer
    A. To provide a decoy target on the network
    Explanation
    A honeypot is a security mechanism used to deceive attackers by providing a decoy target on the network. It is designed to attract and monitor unauthorized access attempts, allowing security professionals to gather information about the attackers' tactics, techniques, and intentions. By diverting attackers' attention to the honeypot, organizations can protect their actual systems and networks from potential harm.

    Rate this question:

  • 5. 

    QUESTION NO: 166Which of the following is a collection of patches?

    • A security template

    • A service pack

    • A security hotfix

    • A security baseline

    Correct Answer
    A. A service pack
    Explanation
    A service pack is a collection of patches that are released by a software vendor to update and improve their software. It typically includes a combination of bug fixes, security updates, and new features. Service packs are usually released periodically and can be installed to ensure that the software is up to date and running smoothly.

    Rate this question:

  • 6. 

    QUESTION NO: 102A technician is reviewing the logical access control method an organization uses. One of the senior managers requests that the technician prevent staff members from logging on during nonworking days. Which of the following should the technician implement to meet managements request?

    • Enforce Kerberos

    • Deploy smart cards

    • Time of day restrictions

    • Access control lists

    Correct Answer
    A. Time of day restrictions
    Explanation
    To meet the senior manager's request of preventing staff members from logging on during nonworking days, the technician should implement time of day restrictions. This control allows the organization to define specific time periods during which users are allowed to log in to the system. By configuring the system to restrict access during nonworking days, the technician can ensure that staff members are unable to log in during those times. This control helps enforce the organization's policy and prevents unauthorized access to the system outside of working hours.

    Rate this question:

  • 7. 

    QUESTION NO: 111Which of the following is a true statement with regards to a NIDS?

    • A NIDS monitors and analyzes network traffic for possible intrusions

    • A NIDS is installed on the proxy server

    • A NIDS prevents certain types of traffic from entering a network.

    • A NIDS is normally installed on the email server.

    Correct Answer
    A. A NIDS monitors and analyzes network traffic for possible intrusions
    Explanation
    A NIDS, or Network Intrusion Detection System, is a security tool that monitors and analyzes network traffic in order to detect and prevent possible intrusions. It does this by examining packets of data that are transmitted across the network, looking for any suspicious or malicious activity. By monitoring network traffic, a NIDS can identify and alert administrators to potential threats or attacks, allowing them to take appropriate action to protect the network. Unlike the other options listed, a NIDS is not installed on a proxy server, does not prevent certain types of traffic from entering a network, and is not typically installed on an email server.

    Rate this question:

  • 8. 

    QUESTION NO: 119Which of the following specifies a set of consistent requirements for a workstation or server?

    • Vulnerability assessment

    • Imaging software

    • Patch management

    • Configuration baseline

    Correct Answer
    A. Configuration baseline
    Explanation
    A configuration baseline refers to a set of consistent requirements for a workstation or server. It outlines the desired configuration settings and standards that should be followed to ensure the system's security, stability, and performance. By establishing a configuration baseline, organizations can maintain consistency across their IT infrastructure, reduce vulnerabilities, and simplify management processes. It serves as a reference point to compare the current configuration against the desired state, allowing for identification and remediation of any deviations.

    Rate this question:

  • 9. 

    QUESTION NO: 151Which of the following type of fire suppression tools would cause the MOST damage to electrical equipment?

    • Water

    • Carbon Dioxide

    • Halon

    • Foam

    Correct Answer
    A. Water
    Explanation
    Water would cause the most damage to electrical equipment because water is a conductor of electricity. When water comes into contact with electrical equipment, it can short circuit the equipment and cause damage or even start a fire. Therefore, using water as a fire suppression tool on electrical equipment would be counterproductive and potentially cause more harm than good.

    Rate this question:

  • 10. 

    QUESTION NO: 174Which of the following provides the MOST comprehensive redundancy for an entire site with the least downtime?

    • A warm site

    • A cold site

    • A mobile site

    • A hot site

    Correct Answer
    A. A hot site
    Explanation
    A hot site provides the most comprehensive redundancy for an entire site with the least downtime. A hot site is a fully equipped and operational secondary site that is ready to take over operations immediately in the event of a disaster or failure at the primary site. It has all the necessary hardware, software, and data backups to ensure minimal disruption to business operations. This makes it the ideal solution for minimizing downtime and ensuring business continuity.

    Rate this question:

  • 11. 

    QUESTION NO: 162Which of the following is a best practice to prevent users from being vulnerable to social engineering?

    • Have a solid acceptable use policy in place with a click through banner

    • Provide thorough and frequent user awareness training.

    • Have user sign both the acceptable use policy and security based HR policy.

    • Provide a service level agreement that addresses social engineering issues.

    Correct Answer
    A. Provide thorough and frequent user awareness training.
    Explanation
    Providing thorough and frequent user awareness training is a best practice to prevent users from being vulnerable to social engineering. This training helps educate users about the various tactics used by social engineers, such as phishing emails, phone scams, and impersonation. It teaches them how to recognize and respond to these threats, ensuring that they do not fall victim to social engineering attacks. By regularly updating and reinforcing this training, users can stay informed and vigilant, reducing the risk of being manipulated by social engineers.

    Rate this question:

  • 12. 

    QUESTION NO: 163The RAS logs on a server show 100 errors in a two minute time period from an attempt to access an account. The error log shows unknown username or password. Which of the following is this an example of?

    • The local firewall is blocking GRE packets.

    • An unauthorized attempt to access the server.

    • The end users ISPis having issues with packet loss.

    • One of the users forgot their password and kept trying to login

    Correct Answer
    A. An unauthorized attempt to access the server.
    Explanation
    The given answer, "An unauthorized attempt to access the server," is the correct explanation for the situation described in the question. The RAS logs on the server show 100 errors in a two-minute time period from an attempt to access an account, and the error log indicates an unknown username or password. This suggests that someone is trying to gain unauthorized access to the server by repeatedly attempting to log in with incorrect credentials.

    Rate this question:

  • 13. 

    QUESTION NO: 176Which of the following allows for notification when a hacking attempt is discovered?

    • NAT

    • NIDS

    • Netflow

    • Protocol analyzer

    Correct Answer
    A. NIDS
    Explanation
    A Network Intrusion Detection System (NIDS) allows for notification when a hacking attempt is discovered. NIDS monitors network traffic and analyzes it for suspicious activities or patterns that may indicate a hacking attempt. When such an attempt is detected, the NIDS can generate notifications or alerts to inform the network administrators or security personnel about the potential security breach. This helps in timely response and mitigation of the attack, ensuring the security of the network.

    Rate this question:

  • 14. 

    QUESTION NO: 187Which of the following media is the LEAST likely to be successfully tapped into?

    • Unshielded twisted pair cable

    • Coaxial cable

    • Fiber optic cable

    • Shielded twisted pair cable

    Correct Answer
    A. Fiber optic cable
    Explanation
    Fiber optic cable is the least likely to be successfully tapped into because it uses light to transmit data, which makes it difficult to intercept without interrupting the signal. Unlike other cables, fiber optic cables do not emit electromagnetic signals that can be easily intercepted, making them more secure against tapping.

    Rate this question:

  • 15. 

    QUESTION NO: 190A DMZ has a fake network that a hacker is attacking. Which of the following is this an example of?

    • Firewall

    • Man-in-the-middle

    • Proxy server

    • Honeypot

    Correct Answer
    A. Honeypot
    Explanation
    This scenario is an example of a honeypot. A honeypot is a decoy system or network that is intentionally designed to attract hackers or malicious activity. It is set up to gather information about the attackers' methods, techniques, and motives. In this case, the DMZ (Demilitarized Zone) has a fake network that is being targeted by a hacker, which fits the definition of a honeypot.

    Rate this question:

  • 16. 

    QUESTION NO: 195A user is denied access to a file. The user had access to the file yesterday. Which of the following is the FIRST action for the technician to take?

    • Deny the users request and forward to the human resources department

    • Reboot the system

    • Verify that theusers permissions are correct

    • Grant access to the file.

    Correct Answer
    A. Verify that theusers permissions are correct
    Explanation
    The first action for the technician to take is to verify that the user's permissions are correct. This is because the user had access to the file yesterday, so it is likely that there may have been a change in their permissions or an error in their access rights. By verifying the user's permissions, the technician can determine if there are any issues with the user's access and take appropriate steps to resolve the problem.

    Rate this question:

  • 17. 

    QUESTION NO: 116Which of the following creates a security buffer zone between two rooms?

    • Mantrap

    • DMZ

    • Turnstile

    • Anti-pass back

    Correct Answer
    A. Mantrap
    Explanation
    A mantrap creates a security buffer zone between two rooms. A mantrap is a physical security device that consists of two interlocking doors or gates. It allows only one person to pass through at a time and ensures that the first door is closed before the second door is opened, creating a secure space between the two rooms. This helps to prevent unauthorized access and provides an additional layer of security.

    Rate this question:

  • 18. 

    QUESTION NO: 129A technician is testing the security of a new database application with a website front-end. The technician notices that when certain characters are input into the application it will crash the server. Which of the following does the technician need to do?

    • Utilize SSL on the website

    • Implement an ACL

    • Lock-down the database

    • Input validation

    Correct Answer
    A. Input validation
    Explanation
    The technician needs to implement input validation. Input validation is a process of checking the user input to ensure that it meets the required criteria and does not contain any malicious or unexpected characters. By implementing input validation, the technician can prevent certain characters from crashing the server and ensure the security and stability of the database application.

    Rate this question:

  • 19. 

    QUESTION NO: 133A user has decided that they do not want an internal LAN segment to use public IP addresses. The user wants to translate them as private IP addresses to a pool of public IP addresses to identify them on the Internet. Which of the following does the user want to implement?

    • IPSec

    • NAT

    • SSH

    • SFTP

    Correct Answer
    A. NAT
    Explanation
    The user wants to implement NAT (Network Address Translation). NAT allows the user to translate internal LAN segment's private IP addresses to a pool of public IP addresses. This allows the internal devices to be identified on the Internet using the public IP addresses, while keeping the private IP addresses hidden from the public network.

    Rate this question:

  • 20. 

    QUESTION NO: 138Which of the following is the primary purpose of a CA?

    • LANMAN validation

    • Encrypt data

    • Kerberos authentication

    • Issue private/public keys

    Correct Answer
    A. Issue private/public keys
    Explanation
    The primary purpose of a CA (Certificate Authority) is to issue private/public keys. A CA is responsible for verifying the identity of individuals, organizations, or devices requesting digital certificates. These certificates contain a public key that is used for encryption and a private key that is used for decryption. By issuing these keys, a CA ensures the security and authenticity of digital communications by enabling encryption and authentication processes.

    Rate this question:

  • 21. 

    QUESTION NO: 154While conducting a review of the system logs, a user had attempted to log onto the network over 250 times. Which of the following type of attacks is MOST likely occurring?

    • Brute force

    • Phishing

    • Spamming

    • DNS spoofing

    Correct Answer
    A. Brute force
    Explanation
    The correct answer is brute force. Brute force is a type of attack where an attacker systematically tries all possible combinations of passwords or encryption keys until the correct one is found. In this scenario, the user attempting to log onto the network over 250 times suggests that they are trying different combinations to gain unauthorized access. This behavior is indicative of a brute force attack.

    Rate this question:

  • 22. 

    QUESTION NO: 188Which of the following allows a person to find public wireless access points?

    • Weak encryption

    • 8021x

    • SSID broadcast

    • Data emanation

    Correct Answer
    A. SSID broadcast
    Explanation
    SSID broadcast allows a person to find public wireless access points. When a wireless access point broadcasts its SSID (Service Set Identifier), it makes itself visible to nearby devices. This allows users to easily identify and connect to the network. While disabling SSID broadcast can provide some level of security by making the network less visible, it does not prevent determined individuals from finding and connecting to the network. Therefore, enabling SSID broadcast is commonly used to make public wireless access points easily discoverable.

    Rate this question:

  • 23. 

    QUESTION NO: 108When is the BEST time to update antivirus definitions?

    • At least once a week as part of system maintenance

    • As the definitions become available from the vendor

    • When a new virus is discovered on the system

    • When an attack occurs on the network

    Correct Answer
    A. As the definitions become available from the vendor
    Explanation
    The best time to update antivirus definitions is when they become available from the vendor. This ensures that the antivirus software has the latest information about new viruses and can effectively protect the system. Updating definitions regularly is crucial to stay ahead of emerging threats and maintain a high level of security.

    Rate this question:

  • 24. 

    QUESTION NO: 123Which of the following is the BEST tool for allowing users to go to approved business-related websites only?

    • Internet content filter

    • Firewall

    • ACL

    • Caching server

    Correct Answer
    A. Internet content filter
    Explanation
    An internet content filter is the best tool for allowing users to go to approved business-related websites only. This tool helps in restricting access to certain websites based on predefined criteria, such as content category or website reputation. By filtering out unauthorized websites, it ensures that users can only access approved and relevant websites, improving productivity and security within the organization. Firewalls, ACLs, and caching servers may have some level of website blocking capabilities, but they are not specifically designed for this purpose and may not provide the same level of control and customization as an internet content filter.

    Rate this question:

  • 25. 

    QUESTION NO: 142An administrator is implementing a public website and they want all client connections to the server to be encrypted via their web browser. Which of the following should be implemented?

    • SSL

    • SHA-1

    • Blowfish

    • 3DES

    Correct Answer
    A. SSL
    Explanation
    SSL (Secure Sockets Layer) should be implemented to encrypt all client connections to the server via their web browser. SSL is a cryptographic protocol that provides secure communication over the internet. It ensures that the data transmitted between the client and the server is encrypted and cannot be easily intercepted or tampered with by unauthorized parties. SSL certificates are commonly used to enable HTTPS (HTTP Secure) connections, which encrypt the data exchanged between the client's web browser and the server.

    Rate this question:

  • 26. 

    QUESTION NO: 156A user was trying to update an open file but when they tried to access the file they were denied. Which of the following would explain why the user could not access the file?

    • Audit only access

    • Execute only access

    • Rights are not set correctly

    • Write only access

    Correct Answer
    A. Rights are not set correctly
    Explanation
    The user could not access the file because the rights are not set correctly. This means that the user does not have the necessary permissions or privileges to access and modify the file. It could be that the user does not have the appropriate read or write permissions, or they may not be a member of the required user group. To resolve this issue, the rights need to be properly configured to grant the user the necessary access to the file.

    Rate this question:

  • 27. 

    QUESTION NO: 178Which of the following allows a technician to scan for missing patches on a device without actually attempting to exploit the security problem?

    • A vulnerability scanner

    • Security baselines

    • A port scanner

    • Group policy

    Correct Answer
    A. A vulnerability scanner
    Explanation
    A vulnerability scanner is a tool that allows a technician to scan for missing patches on a device without actually attempting to exploit the security problem. It helps identify vulnerabilities in a system by scanning for known security weaknesses and provides a report on the missing patches or vulnerabilities found. This allows the technician to proactively address security issues before they can be exploited by attackers. Security baselines, port scanners, and group policy are not specifically designed for scanning and identifying missing patches on a device.

    Rate this question:

  • 28. 

    QUESTION NO: 103How would a technician implement a security patch in an enterprise environment?

    • Download the patch from the vendors secure website and install it on the most vulnerable workstation

    • Download the patch from the vendors secure website, test the patch and install it on all workstations.

    • Download the patch from the vendors secure website and install it as needed

    • Download the patch from the Internet, test the patch and install it on all of the productionservers.WBerlin

    Correct Answer
    A. Download the patch from the vendors secure website, test the patch and install it on all workstations.
    Explanation
    In order to implement a security patch in an enterprise environment, a technician would need to download the patch from the vendor's secure website. However, before installing it on all workstations, it is important to test the patch to ensure compatibility and effectiveness. This step is crucial in order to prevent any potential issues or conflicts that may arise from the installation. Once the patch has been successfully tested, it can then be installed on all workstations to ensure that the enterprise environment is protected from any vulnerabilities.

    Rate this question:

  • 29. 

    QUESTION NO: 112A technician suspects that a piece of malware is consuming too many CPU cycles and slowing down a system. Which of the following will help determine the amount of CPU cycles that are being consumed?

    • Install HIDS to determine the CPU usage

    • Run performance monitor to evaluate the CPU usage

    • Install malware scanning software

    • Use a protocol analyzer to find the cause of the traffic

    Correct Answer
    A. Run performance monitor to evaluate the CPU usage
    Explanation
    Running a performance monitor will help determine the amount of CPU cycles that are being consumed. Performance monitor provides real-time data and statistics about the system's performance, including CPU usage. By monitoring the CPU usage, the technician can identify any abnormal spikes or high usage that may indicate malware consuming excessive CPU cycles and slowing down the system. This will help in identifying and troubleshooting the issue.

    Rate this question:

  • 30. 

    QUESTION NO: 184Which of the following would use a group of bots to stop a web server from accepting new requests?

    • DoS

    • DDoS

    • MAC

    • ARP

    Correct Answer
    A. DDoS
    Explanation
    A DDoS (Distributed Denial of Service) attack involves the use of a group of bots or compromised computers to flood a web server with an overwhelming amount of traffic, rendering it unable to accept new requests from legitimate users. This type of attack overwhelms the server's resources and causes it to become unresponsive or crash. Unlike a DoS (Denial of Service) attack, which is carried out by a single source, a DDoS attack utilizes multiple sources, making it more difficult to mitigate and defend against. The correct answer is DDoS.

    Rate this question:

  • 31. 

    QUESTION NO: 114Which of the following is the MOST secure alternative for administrative access to a router?

    • SSH

    • Telnet

    • Rlogin

    • HTTP

    Correct Answer
    A. SSH
    Explanation
    SSH (Secure Shell) is the most secure alternative for administrative access to a router. Unlike Telnet, rlogin, and HTTP, SSH provides encrypted communication, ensuring that data transmitted between the router and the administrator is protected from eavesdropping and unauthorized access. SSH also supports authentication mechanisms, such as public-key cryptography, making it more secure than the other options listed.

    Rate this question:

  • 32. 

    QUESTION NO: 131A user is redirected to a different website when the user requests the DNS record www.xyz.comptiA. com. Which of the following is this an example of?

    • DNS poisoning

    • DoS

    • DNS caching

    • Smurf attack

    Correct Answer
    A. DNS poisoning
    Explanation
    This is an example of DNS poisoning, where the user is redirected to a different website than the one they intended to visit. DNS poisoning occurs when an attacker maliciously alters the DNS records to redirect traffic to a different IP address, often leading to phishing or malware-infected websites.

    Rate this question:

  • 33. 

    QUESTION NO: 155Users do not want to enter credentials to each server or application to conduct their normal work. Which of the following type of strategies will resolve this issue?

    • Smart card

    • Two-factor authentication

    • Biometrics

    • SSO

    Correct Answer
    A. SSO
    Explanation
    Single Sign-On (SSO) is a strategy that allows users to authenticate once and then access multiple servers or applications without having to enter their credentials again. This resolves the issue of users having to enter credentials for each server or application they need to access, making it more convenient for them to conduct their normal work. SSO provides a seamless and secure authentication process, enhancing user experience and productivity.

    Rate this question:

  • 34. 

    QUESTION NO: 109Why would a technician use a password cracker?

    • To look for weak passwords on the network

    • To changea users passwords when they leave the company

    • To enforce password complexity requirements

    • To change users passwords if they have forgotten them

    Correct Answer
    A. To look for weak passwords on the network
    Explanation
    A technician would use a password cracker to identify weak passwords on the network. This tool helps in testing the strength of passwords by attempting to crack or guess them. By using a password cracker, the technician can identify any passwords that are easily guessable or too weak, which could pose a security risk to the network. This allows the technician to take appropriate measures to strengthen the passwords and enhance the overall security of the network.

    Rate this question:

  • 35. 

    QUESTION NO: 110Users on a network report that they are receiving unsolicited emails from an email address that does not change. Which of the following steps should be taken to stop this from occurring?

    • Configure a rule in eachusers router and restart the router.

    • Configure rules on the users host and restart the host.

    • Install an anti-spam filter on the domain mail servers and filter the email address.

    • Install an ACL on the firewall to block traffic from the sender and filter the IP address.

    Correct Answer
    A. Install an anti-spam filter on the domain mail servers and filter the email address.
    Explanation
    To stop receiving unsolicited emails from a specific email address that remains constant, the best solution is to install an anti-spam filter on the domain mail servers and filter the email address. This will allow the filter to scan incoming emails and block any emails from the specified address. Configuring rules on individual routers or hosts would not be effective in stopping these emails, as they would still reach the network. Similarly, installing an ACL on the firewall to block traffic from the sender might not be sufficient as the emails could still bypass the firewall. Therefore, the most appropriate solution is to implement an anti-spam filter on the domain mail servers.

    Rate this question:

  • 36. 

    QUESTION NO: 120A companys website allows customers to search for a product and display the current price and quantity available of each product from the production database. Which of the following would invalidate an SQL injection attack launched from the lookup field at the web server level?

    • Security template

    • Buffer overflow protection

    • NIPS

    • Input validation

    Correct Answer
    A. Input validation
    Explanation
    Input validation would invalidate an SQL injection attack launched from the lookup field at the web server level. Input validation is the process of ensuring that user input is clean and safe before it is processed by the application. In the context of this question, input validation would involve checking and sanitizing the user's search query to prevent any malicious SQL code from being executed. By implementing proper input validation, the website can effectively prevent SQL injection attacks and protect the production database from unauthorized access or manipulation.

    Rate this question:

  • 37. 

    QUESTION NO: 136An administrator wants to ensure that that no equipment is damaged when there is a fire or false alarm in the server room. Which of the following type of fire suppression systems should be used?

    • Carbon Dioxide

    • Hydrogen Peroxide

    • Wet pipe sprinkler

    • Deluge sprinkler

    Correct Answer
    A. Carbon Dioxide
    Explanation
    Carbon Dioxide fire suppression systems should be used in the server room to ensure that no equipment is damaged during a fire or false alarm. Carbon Dioxide is a clean agent that does not leave residue or cause damage to electronic equipment. It works by displacing oxygen, effectively suffocating the fire. This type of fire suppression system is commonly used in areas where water or other agents could cause damage to sensitive equipment.

    Rate this question:

  • 38. 

    QUESTION NO: 137Which of the following is a CRL composed of?

    • Public Key Infrastructure (PKI)

    • Expired or revoked certificates

    • Certificate authorities

    • Expired user accounts

    Correct Answer
    A. Expired or revoked certificates
    Explanation
    A Certificate Revocation List (CRL) is a component of a Public Key Infrastructure (PKI) system. It is a list of digital certificates that have been revoked or expired before their validity period. The CRL is maintained by Certificate Authorities (CAs) and is used to verify the validity of certificates during the authentication process. Therefore, the correct answer is "Expired or revoked certificates" because a CRL is composed of these certificates.

    Rate this question:

  • 39. 

    QUESTION NO: 157Accessing a system or application using permissions from another users account is a form of which of the following?

    • Phishing

    • Domain kiting

    • ARP spoofing

    • Privilege escalation

    Correct Answer
    A. Privilege escalation
    Explanation
    Privilege escalation refers to the act of gaining elevated privileges or access to a system or application beyond what is originally granted to a user. In this scenario, accessing a system or application using permissions from another user's account can be considered a form of privilege escalation. By using another user's account, the attacker can bypass their own limited privileges and gain unauthorized access to resources or perform actions that they would not normally be able to do.

    Rate this question:

  • 40. 

    QUESTION NO: 168Which of the following is the BEST place where the disaster recovery plan should be kept?

    • Printed out and kept in the desk of the CIO

    • At multiple offsite locations

    • Multiple copies printed out and kept in the server room

    • On the network file server

    Correct Answer
    A. At multiple offsite locations
    Explanation
    The disaster recovery plan should be kept at multiple offsite locations because in the event of a disaster, having the plan stored in multiple offsite locations ensures that it is easily accessible and not vulnerable to being destroyed or inaccessible at a single location. This helps to ensure that the organization can quickly recover and resume operations following a disaster.

    Rate this question:

  • 41. 

    QUESTION NO: 179Which of the following allows for proof that a certain person sent a particular email?

    • Steganography

    • Integrity

    • Trusted Platform Module

    • Non-repudiation

    Correct Answer
    A. Non-repudiation
    Explanation
    Non-repudiation allows for proof that a certain person sent a particular email. Non-repudiation is a security measure that ensures that the sender of a message cannot deny sending it. It provides evidence that the sender is who they claim to be, and that the message has not been altered during transmission. This is typically achieved through the use of digital signatures or certificates, which can be used to verify the authenticity and integrity of the email.

    Rate this question:

  • 42. 

    QUESTION NO: 182Sending a patch through a testing and approval process is an example of which of the following?

    • Disaster planning

    • Change management

    • Acceptable use policies

    • User education and awareness training

    Correct Answer
    A. Change management
    Explanation
    Sending a patch through a testing and approval process is an example of change management. Change management refers to the process of controlling and managing changes to a system or environment in a structured and systematic way. In this case, the patch is considered a change, and it is being managed by going through a testing and approval process to ensure that it is implemented correctly and does not cause any negative impacts on the system.

    Rate this question:

  • 43. 

    QUESTION NO: 198An intrusion has been detected on a company's network from the Internet. Which of the following should be checked FIRST?

    • The firewall logs

    • The DNS logs

    • The access logs

    • The performance logs

    Correct Answer
    A. The firewall logs
    Explanation
    The correct answer is the firewall logs. When an intrusion is detected on a company's network from the Internet, the first thing to check is the firewall logs. Firewall logs contain information about incoming and outgoing network traffic, including details about any unauthorized access attempts or suspicious activities. By analyzing the firewall logs, the security team can identify the source of the intrusion, the methods used, and take appropriate actions to mitigate the threat. Checking other logs such as DNS logs, access logs, or performance logs may also be necessary, but the firewall logs should be the first priority.

    Rate this question:

  • 44. 

    QUESTION NO: 127An administrator has developed an OS install that will implement the tightest security controls possible. In order to quickly replicate these controls on all systems, which of the following should be established?

    • Take screen shots of the configuration options

    • Create an image from the OS install.

    • Create a boot disk for the operating system

    • Implement OS hardening procedures

    Correct Answer
    A. Create an image from the OS install.
    Explanation
    Creating an image from the OS install is the best option for quickly replicating the tightest security controls on all systems. By creating an image, the administrator can capture the entire configuration and settings of the OS install, including the security controls. This image can then be easily deployed to multiple systems, ensuring consistent security measures are implemented across all of them. Taking screen shots of the configuration options may not capture all the necessary settings and can be time-consuming to replicate. Creating a boot disk for the operating system may not include all the security controls, and implementing OS hardening procedures would require manual configuration on each system.

    Rate this question:

  • 45. 

    QUESTION NO: 140A user is attempting to receive digitally signed and encrypted email messages from a remote office. Which of the following protocols does the system need to support?

    • SMTP

    • S/MIME

    • ISAKMP

    • IPSec

    Correct Answer
    A. S/MIME
    Explanation
    The user needs to support S/MIME (Secure/Multipurpose Internet Mail Extensions) in order to receive digitally signed and encrypted email messages. S/MIME is a protocol that provides a secure method for sending and receiving email messages, ensuring confidentiality, integrity, authentication, and non-repudiation of the messages. It uses public key cryptography to digitally sign and encrypt the messages, providing a secure communication channel between the sender and the recipient.

    Rate this question:

  • 46. 

    QUESTION NO: 150Antivirus software products detect malware by comparing the characteristics of known instances against which of the following type of file sets?

    • Signature

    • Text

    • NIDS signature

    • Dynamic Library

    Correct Answer
    A. Signature
    Explanation
    Antivirus software products detect malware by comparing the characteristics of known instances against signature file sets. Signature files contain unique patterns or signatures of known malware, allowing the antivirus software to identify and remove them from a system. By comparing the characteristics of files against these signatures, the antivirus software can determine if a file is malicious or not.

    Rate this question:

  • 47. 

    QUESTION NO: 159Which of the following is a software bundle containing multiple security fixes?

    • Patch management

    • A hotfix

    • Service pack

    • A patch

    Correct Answer
    A. Service pack
    Explanation
    A service pack is a software bundle that contains multiple security fixes. It is a collection of updates, bug fixes, and enhancements for a specific software product. Service packs are released periodically by software vendors to address known vulnerabilities and improve the overall stability and security of the software. They are typically larger in size compared to individual patches or hotfixes, as they include a comprehensive set of updates and fixes for the software.

    Rate this question:

  • 48. 

    QUESTION NO: 164An administrator notices that former temporary employees accounts are still active on a domain. Which of the following can be implemented to increase security and prevent this from happening?

    • Run a last logon script to look for inactive accounts.

    • Implement an account expiration date for temporary employees

    • Implement a password expiration policy

    • Implement time of day restrictions for all temporary employees

    Correct Answer
    A. Implement an account expiration date for temporary employees
    Explanation
    Implementing an account expiration date for temporary employees would increase security and prevent former temporary employees' accounts from remaining active on the domain. By setting an expiration date for these accounts, they will automatically be deactivated after a specified period, ensuring that only current employees have access to the domain resources. This measure helps to minimize the risk of unauthorized access and potential security breaches.

    Rate this question:

  • 49. 

    QUESTION NO: 175Which of the following allows devices attached to the same switch to have separate broadcast domains?

    • NAT

    • DMZ

    • NAC

    • VLAN

    Correct Answer
    A. VLAN
    Explanation
    VLAN (Virtual Local Area Network) allows devices attached to the same switch to have separate broadcast domains. VLANs divide a physical network into multiple logical networks, allowing devices in different VLANs to communicate with each other as if they were on separate physical networks. This helps to reduce network congestion and improve network performance by limiting the scope of broadcast traffic.

    Rate this question:

Quiz Review Timeline (Updated): Feb 28, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 28, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 18, 2010
    Quiz Created by
    Ctstravis
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.