SEC+ Study Guide E

100 Questions | Total Attempts: 107

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Security +


Questions and Answers
  • 1. 
    QUESTION NO: 401To facilitate compliance with the Internet use portion of the corporate acceptable use policy, an administrator implements a series of proxy servers and firewalls. The administrator furtherrecommends installation of software based firewalls on each host on the network. Which of the following would have provided an alternative simpler solution?
    • A. 

      Internet content filter

    • B. 

      Hardware IDS

    • C. 

      Software HIPS

    • D. 

      DMZ

  • 2. 
    QUESTION NO: 402The marketing department wants to distribute pens with embedded USB drives to clients. In the past this client has been victimized by social engineering attacks which led to a loss of sensitive datA. The security administrator advises the marketing department not to distribute the USB pens due to which of the following?
    • A. 

      The risks associated with the large capacity of USB drives and their concealable nature

    • B. 

      The security costs associated with securing the USB drives over time

    • C. 

      The cost associated with distributing a large volume of the USB pens

    • D. 

      The security risks associated with combining USB drives and cell phones on a network

  • 3. 
    QUESTION NO: 403 USB drives create a potential security risk due to which of the following?
    • A. 

      Operating system incompatibility

    • B. 

      Large storage capacity

    • C. 

      Widespread use

    • D. 

      Potential for software introduction

  • 4. 
    QUESTION NO: 404 As a best practice, risk assessments should be based upon which of the following?
    • A. 

      A qualitative measurement of risk and impact

    • B. 

      A survey of annual loss, potential threats and asset value

    • C. 

      A quantitative measurement of risk, impact and asset value

    • D. 

      An absolute measurement of threats

  • 5. 
    QUESTION NO: 405 Which of the following is a cryptographic hash function?
    • A. 

      RSA

    • B. 

      SHA

    • C. 

      RC4

    • D. 

      ECC

  • 6. 
    QUESTION NO: 406 From a security standpoint, which of the following is the BEST reason to implement performance monitoring applications on network systems?
    • A. 

      To detect network intrusions from external attackers

    • B. 

      To detect integrity degradations to network attached storage

    • C. 

      To detect host intrusions from external networks

    • D. 

      To detect availability degradations caused by attackers

  • 7. 
    QUESTION NO: 407 All of the following are methods used to conduct risk assessments EXCEPT:
    • A. 

      Penetration tests.

    • B. 

      Security audits.

    • C. 

      Vulnerability scans.

    • D. 

      Disaster exercises.

  • 8. 
    QUESTION NO: 408 After conducting a risk assessment, the main focus of an administrator should be which of the following?
    • A. 

      To report the results of the assessment to the users

    • B. 

      To ensure all threats are mitigated

    • C. 

      To ensure all vulnerabilities are eliminated

    • D. 

      To ensure risk mitigation activities are implemented

  • 9. 
    QUESTION NO: 409 Which of the following is a BEST practice when implementing a new system?
    • A. 

      Disable unneeded services

    • B. 

      Use group policies

    • C. 

      Implement open source alternatives.

    • D. 

      Use default installations.

  • 10. 
    QUESTION NO: 410 When installing and securing a new system for a home user which of the following are best practices? (Select THREE).
    • A. 

      Use a strong firewall.

    • B. 

      Block inbound access to port 80

    • C. 

      Apply all system patches

    • D. 

      Use input validation

    • E. 

      Install remote control software

    • F. 

      Apply all service packs.

  • 11. 
    QUESTION NO: 411 Which of the following describes a logic bomb?
    • A. 

      A piece of malicious code that can spread on its own

    • B. 

      A piece of malicious code that is concealed from all detection

    • C. 

      A piece of malicious code that executes based on an event or date

    • D. 

      A piece of malicious code that exploits a race condition

  • 12. 
    QUESTION NO: 412 Which of the following is a prerequisite for privilege escalation to occur?
    • A. 

      The attacker has to create their own zero day attack for privilege escalation

    • B. 

      The attacker must already have physical access to the system.

    • C. 

      The attacker must use arootkit in conjunction with privilege escalation.

    • D. 

      The attacker must have already gained entry into the system

  • 13. 
    QUESTION NO: 413 Which of the following is an example of an attack that executes once a year on a certain date?
    • A. 

      Virus

    • B. 

      Worm

    • C. 

      Logic bomb

    • D. 

      Rootkit

  • 14. 
    QUESTION NO: 414 Which of the following is the GREATEST threat to highly secure environments?
    • A. 

      Network attached storage

    • B. 

      BIOS configuration

    • C. 

      RSA256

    • D. 

      USB devices

  • 15. 
    QUESTION NO: 415 Management has asked a technician to prevent data theft through the use of portable drives. Which of the following should the technician implement?
    • A. 

      Install a CCTV system

    • B. 

      Use security templates

    • C. 

      Implement a biometric system.

    • D. 

      Disable USB drives.

  • 16. 
    QUESTION NO: 416 A technician has been informed that many of the workstations on the network are flooding servers. Which of the following is the MOST likely cause of this?
    • A. 

      Worm

    • B. 

      Logic bomb

    • C. 

      Virus

    • D. 

      Spam

  • 17. 
    QUESTION NO: 417 Which of the following BEST describes a way to prevent buffer overflows?
    • A. 

      Apply all security patches to workstations

    • B. 

      Apply security templates enterprisewidE.

    • C. 

      Apply group policy management techniques.

    • D. 

      Spam

  • 18. 
    QUESTION NO: 418 Which of the following is a security reason to implement virtualization throughout the network infrastructure?
    • A. 

      To analyze the various network traffic with protocol analyzers

    • B. 

      To centralize the patch management of network servers

    • C. 

      To isolate the various network services and roles

    • D. 

      To implement additional network services at a lower cost

  • 19. 
    QUESTION NO: 419 Which of the following is a reason to use a Faraday cage?
    • A. 

      To allow wireless usage

    • B. 

      To minimize weak encryption

    • C. 

      To mitigate data emanation

    • D. 

      To find rogue access points

  • 20. 
    QUESTION NO: 420 Weak encryption is a common problem with which of the following wireless protocols?
    • A. 

      WPA2-Enterprise

    • B. 

      WEP

    • C. 

      WPA2-Personal

    • D. 

      WPA

  • 21. 
    QUESTION NO: 421 Which of the following describes a tool used by organizations to verify whether or not a staff member has been involved in malicious activity?
    • A. 

      Mandatory vacations

    • B. 

      Implicit deny

    • C. 

      Implicit allow

    • D. 

      Time of day restrictions

  • 22. 
    QUESTION NO: 422 Which of the following is a cross-training technique where organizations minimize collusion amongst staff?
    • A. 

      Least privilege

    • B. 

      Job rotation

    • C. 

      Cross-site scripting

    • D. 

      Separation of duties

  • 23. 
    QUESTION NO: 423 Which of the following will allow a technician to restrict a users access to the GUI?
    • A. 

      Access control lists

    • B. 

      Group policy implementation

    • C. 

      Use of logical tokens

    • D. 

      Password policy enforcement

  • 24. 
    QUESTION NO: 424 Which of the following is the MOST common logical access control method?
    • A. 

      Access control lists

    • B. 

      Usernames and password

    • C. 

      Multifactor authentication

    • D. 

      Security ID badges

  • 25. 
    QUESTION NO: 425 Which of the following verifies control for granting access in a PKI environment?
    • A. 

      System administrator

    • B. 

      Certificate authority

    • C. 

      Recovery agent

    • D. 

      Certificate revocation list

Back to Top Back to top