Sec+ study guide E assesses knowledge on network security, risk management, and cryptographic techniques. It tests understanding of corporate security policies, USB security risks, and the importance of performance monitoring. Ideal for learners aiming to validate their cybersecurity skills.
Virus
Worm
Logic bomb
Rootkit
Rate this question:
Implementing two-factor authentication
Enabling complex password policies
Conducting user awareness training
Requiring the use of stronger encryption
Rate this question:
WLANs.
The Internet.
LANs.
WANs.
Rate this question:
Publishes the organizations internal network addressing scheme
Publishes the organizations external network addressing scheme
Hides the organizations internal network addressing scheme
Hides the organizations external network addressing scheme
Rate this question:
Verify the integrity of the patch.
Deploy immediately using Patch Management.
Verify the patch is relevant to the system.
Test it in a non-production environment.
Rate this question:
SHTTP
SSH
HTTPS
S/MIME
Rate this question:
SMTP
SSL
MIME
S/MIME
Rate this question:
Disable unneeded services
Use group policies
Implement open source alternatives.
Use default installations.
Rate this question:
WPA2-Enterprise
WEP
WPA2-Personal
WPA
Rate this question:
Install a CCTV system
Use security templates
Implement a biometric system.
Disable USB drives.
Rate this question:
System administrator
Certificate authority
Recovery agent
Certificate revocation list
Rate this question:
Configuration baseline
Group policy
Patch management
Security template
Rate this question:
Adware
Worm
Botnet
Virus
Rate this question:
The risks associated with the large capacity of USB drives and their concealable nature
The security costs associated with securing the USB drives over time
The cost associated with distributing a large volume of the USB pens
The security risks associated with combining USB drives and cell phones on a network
Rate this question:
Use a strong firewall.
Block inbound access to port 80
Apply all system patches
Use input validation
Install remote control software
Apply all service packs.
Rate this question:
Network attached storage
BIOS configuration
RSA256
USB devices
Rate this question:
Addresses the recovery of an organizations business operations
Addresses the recovery of an organizations business payroll system
Addresses the recovery of an organizations business facilities
Addresses the recovery of an organizations backup site
Rate this question:
Logical token
Performance monitor
Public key infrastructure
Trusted platform module
Rate this question:
Impedance
Inheritance
Mirroring
Replication
Rate this question:
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Rule-base access control (RBAC)
Role-based access control (RBAC)
Rate this question:
Separation of duties
Full control
Authentication
Least privilege
Rate this question:
A qualitative measurement of risk and impact
A survey of annual loss, potential threats and asset value
A quantitative measurement of risk, impact and asset value
An absolute measurement of threats
Rate this question:
The attacker has to create their own zero day attack for privilege escalation
The attacker must already have physical access to the system.
The attacker must use arootkit in conjunction with privilege escalation.
The attacker must have already gained entry into the system
Rate this question:
A duplication
A collision
A pseudo-random event
Amirror
Rate this question:
Risk mitigation
Risk avoidance
Risk acceptance
Risk transfer
Rate this question:
Spam.
Trojan.
Virus.
Logical bombs
Rate this question:
The public key is only used by the client while the private key is available to all. Both keys are mathematically related
The private key only decrypts the data while the public key only encrypts the data. Both keys are mathematically related
The private key is commonly used in symmetric key decryption while the public key is used in asymmetric key decryption.
The private key is only used by the client and kept secret while the public key is available to all
Rate this question:
Virtualization
Host-based firewall
Antivirus
HIDS
Rate this question:
Adding a heat deflector
Redundant HVAC systems
Shielding
Add a wireless network
Rate this question:
Conducted from outside the perimeter switch but inside the firewall
Conducted from outside the building that hosts the organizations servers
Conducted from outside the organizations security perimeter
Conducted from outside the perimeter switch but inside the border router
Rate this question:
Internet content filter
Packet filter
Application firewall
Hybrid firewall
Rate this question:
Signature-based
NIDS
Anomaly-based
NIPS
Rate this question:
Remote access policy
Terminal access control
Virtual Private Networking (VPN)
Remote authentication
Rate this question:
Trojan
Logic bombs
Worms
Botnets
Rate this question:
To allow wireless usage
To minimize weak encryption
To mitigate data emanation
To find rogue access points
Rate this question:
Decide on thetypE.
Decide on the model.
Purchase the equipment.
Document the existing network.
Rate this question:
Rule-based
Role-based
Discretionary
Decentralized
Rate this question:
CPU performance
NIC performance
System files
Temporary Internet files
Rate this question:
Service pack
Remote access
Patch management
Installer package
Rate this question:
Password
Encrypt the hard drive
Create an access-list
Flash the BIOS
Rate this question:
Decrypt,decipher, encode and encrypt
Sign,validate, encrypt and verify
Decrypt,validate, encode and verify
Encrypt, sign, decrypt and verify
Rate this question:
The false rejection rate
They are expensive and complex
They can be easily fooled or bypassed
The error human factor
Rate this question:
Addresses the recovery of an organizations business documentation
Addresses the recovery of an organizations email
Addresses the recovery of an organizations backup site
Addresses the recovery of an organizations IT infrastructure
Rate this question:
Internet content filter
Group policy
Control panel
P2P software
Rate this question:
Penetration tests.
Security audits.
Vulnerability scans.
Disaster exercises.
Rate this question:
Warm site
Proxy server
RAID
Single point of failure
Rate this question:
Role-Based Access Control (RBAC)
Mandatory Access Control (MAC)
Lightweight Directory Access Protocol (LDAP)
Discretionary Access Control (DAC)
Rate this question:
S/MIME
SNMP
SSH
SMTP
Rate this question:
Quiz Review Timeline (Updated): Aug 9, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.