Sec+ Study Guide B focuses on enhancing cybersecurity skills, covering secure virtualization, access controls, patch management, and encryption. It prepares technicians for Security+ certification, emphasizing practical security measures and infrastructure protection.
Phishing
Insider theft
Dumpster diving
Shoulder surfing
Rate this question:
Instant messagetraffiC.
SPIM
S/MIME.
Spam.
Rate this question:
Translate addresses at the perimeter
To provide a decoy target on the network
Provide cryptography for the network
Work as a network proxy
Rate this question:
A security template
A service pack
A security hotfix
A security baseline
Rate this question:
Enforce Kerberos
Deploy smart cards
Time of day restrictions
Access control lists
Rate this question:
A NIDS monitors and analyzes network traffic for possible intrusions
A NIDS is installed on the proxy server
A NIDS prevents certain types of traffic from entering a network.
A NIDS is normally installed on the email server.
Rate this question:
Vulnerability assessment
Imaging software
Patch management
Configuration baseline
Rate this question:
Water
Carbon Dioxide
Halon
Foam
Rate this question:
A warm site
A cold site
A mobile site
A hot site
Rate this question:
Have a solid acceptable use policy in place with a click through banner
Provide thorough and frequent user awareness training.
Have user sign both the acceptable use policy and security based HR policy.
Provide a service level agreement that addresses social engineering issues.
Rate this question:
The local firewall is blocking GRE packets.
An unauthorized attempt to access the server.
The end users ISPis having issues with packet loss.
One of the users forgot their password and kept trying to login
Rate this question:
NAT
NIDS
Netflow
Protocol analyzer
Rate this question:
Unshielded twisted pair cable
Coaxial cable
Fiber optic cable
Shielded twisted pair cable
Rate this question:
Firewall
Man-in-the-middle
Proxy server
Honeypot
Rate this question:
Deny the users request and forward to the human resources department
Reboot the system
Verify that theusers permissions are correct
Grant access to the file.
Rate this question:
Mantrap
DMZ
Turnstile
Anti-pass back
Rate this question:
Utilize SSL on the website
Implement an ACL
Lock-down the database
Input validation
Rate this question:
IPSec
NAT
SSH
SFTP
Rate this question:
LANMAN validation
Encrypt data
Kerberos authentication
Issue private/public keys
Rate this question:
Brute force
Phishing
Spamming
DNS spoofing
Rate this question:
Weak encryption
8021x
SSID broadcast
Data emanation
Rate this question:
At least once a week as part of system maintenance
As the definitions become available from the vendor
When a new virus is discovered on the system
When an attack occurs on the network
Rate this question:
Internet content filter
Firewall
ACL
Caching server
Rate this question:
SSL
SHA-1
Blowfish
3DES
Rate this question:
Audit only access
Execute only access
Rights are not set correctly
Write only access
Rate this question:
A vulnerability scanner
Security baselines
A port scanner
Group policy
Rate this question:
Download the patch from the vendors secure website and install it on the most vulnerable workstation
Download the patch from the vendors secure website, test the patch and install it on all workstations.
Download the patch from the vendors secure website and install it as needed
Download the patch from the Internet, test the patch and install it on all of the productionservers.WBerlin
Rate this question:
Install HIDS to determine the CPU usage
Run performance monitor to evaluate the CPU usage
Install malware scanning software
Use a protocol analyzer to find the cause of the traffic
Rate this question:
DoS
DDoS
MAC
ARP
Rate this question:
SSH
Telnet
Rlogin
HTTP
Rate this question:
DNS poisoning
DoS
DNS caching
Smurf attack
Rate this question:
Smart card
Two-factor authentication
Biometrics
SSO
Rate this question:
To look for weak passwords on the network
To changea users passwords when they leave the company
To enforce password complexity requirements
To change users passwords if they have forgotten them
Rate this question:
Configure a rule in eachusers router and restart the router.
Configure rules on the users host and restart the host.
Install an anti-spam filter on the domain mail servers and filter the email address.
Install an ACL on the firewall to block traffic from the sender and filter the IP address.
Rate this question:
Security template
Buffer overflow protection
NIPS
Input validation
Rate this question:
Carbon Dioxide
Hydrogen Peroxide
Wet pipe sprinkler
Deluge sprinkler
Rate this question:
Public Key Infrastructure (PKI)
Expired or revoked certificates
Certificate authorities
Expired user accounts
Rate this question:
Phishing
Domain kiting
ARP spoofing
Privilege escalation
Rate this question:
Printed out and kept in the desk of the CIO
At multiple offsite locations
Multiple copies printed out and kept in the server room
On the network file server
Rate this question:
Steganography
Integrity
Trusted Platform Module
Non-repudiation
Rate this question:
Disaster planning
Change management
Acceptable use policies
User education and awareness training
Rate this question:
The firewall logs
The DNS logs
The access logs
The performance logs
Rate this question:
Take screen shots of the configuration options
Create an image from the OS install.
Create a boot disk for the operating system
Implement OS hardening procedures
Rate this question:
SMTP
S/MIME
ISAKMP
IPSec
Rate this question:
Signature
Text
NIDS signature
Dynamic Library
Rate this question:
Patch management
A hotfix
Service pack
A patch
Rate this question:
Run a last logon script to look for inactive accounts.
Implement an account expiration date for temporary employees
Implement a password expiration policy
Implement time of day restrictions for all temporary employees
Rate this question:
NAT
DMZ
NAC
VLAN
Rate this question:
Quiz Review Timeline (Updated): Feb 28, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.