To the entire tech crazy people out there who want to see how much they really know about sec+, take this quiz. It is specifically designed to help you find out your knowledge that is based on Sec+ study guide.
A hashing chain occurred
A deviation occurred.
A collision occurred.
A one-way hash occurred.
Rate this question:
Spyware
Worm
Spam
Adware
Rate this question:
Vulnerability assessment
Fingerprinting
Malware scan
Baselining
Rate this question:
To detect when a user changes security permissions
To prevent a user from changing security permissions
To prevent a user from changing security settings
To detect the encryption algorithm used for files
Rate this question:
Botnets
Adware
Spam
Rootkit
Rate this question:
Access control list
Non-repudiation
Logical token
Hardware token
Rate this question:
The first thing a technician should perform is a file system backup.
The first thing a technician should do is call in law enforcement.
If a technician finds illegal content, they should follow company incident response procedures.
If a technician finds illegal content, the first thing a technician should do is unplug the machine and back it up.
Rate this question:
Account expiration
Time of day restriction
Account lockout
Domain password policy
Rate this question:
P2P
ActiveX controls
Instant messaging
Internet mail
Rate this question:
The PKI CA is relocateD
The backup generator activates.
The single point of failure isremedieD
Full electrical service isrestoreD
Rate this question:
Networkmappe
Protocol analyzer.
Vulnerabilityscan.
Port scan.
Rate this question:
ACL
User access and rights review policies
Group policy
Storage and retention policies
Rate this question:
Zombie
Worm
Virus
Adware
Rate this question:
Shutdown all affected servers until management can benotifieD.
Visit a search engine and search for a possible patch.
Wait for an automatic update to be pushed out to the server from the manufacturer.
Visit the operating systemmanufacturers website for a possible patch.
Rate this question:
Firewall
Honeypot
NIDS
NAC
Rate this question:
Stop and immediately make a backup of the account and contact the owner of the data.
Stop and immediatelyfollow company approved incident response procedures.
Stop and immediately copy the system files and contact the ISP.
Stop and immediately perform a full system backup and contact the owner of the data.
Rate this question:
False positive
True negative
False negative
True positive
Rate this question:
Apply a security patch from the vendor.
Perform a penetration test.
Repeat the vulnerability scan.
Update the antivirus definition file.
Rate this question:
Worm
Trojan
Spyware
Virus
Rate this question:
A firewall attempts to detect patterns and a NIDS operates on a rule list.
A firewall operates on a rule list and a NIDS attempts to detect patterns.
A firewall prevents inside attacks and a NIDS prevents outside attacks.
A firewall prevents outside attacks and a NIDS prevents inside attacks.
Rate this question:
SSID broadcast
Data emanation
RF analysis
Fuzzing
Rate this question:
Antivirus
Firewall
Router
NAC
Rate this question:
Encrypted file system (EFS)
Printing policies
Data retention
Directory services
Rate this question:
Group policy
Virtual machine
Configuration baseline
Patch management
Rate this question:
A hash is a unique number that is generated based upon the TCP/IP transmission header and should be verified beforedownloaD.
A hash is a unique number that is generated based upon the files contents and used as the SSL key duringdownloaD
A hash is a unique number that is generated after the file has been encrypted and used as the SSL key duringdownloaD.
A hash is a unique number that is generated based upon the files contents and should be verified after download.
Rate this question:
NTLM
LANMAN
SHA-1
AES
Rate this question:
Warm site
Hot site
Reciprocal site
Cold site
Rate this question:
RAID
Backup generator
Hot site
Redundant servers
Rate this question:
Enterprise resource planning software
Enterprise performance monitoring software
Enterprise antivirus software
Enterprise key management software
Rate this question:
Buffer overflow
Rootkit
Logic bomb
Privilege escalation
Rate this question:
Blue snarfing.
Discovery modE
Blue jacking
A smurf attack.
Rate this question:
Botnet
Trojan
Logic bomb
Worm
Rate this question:
DHCP server
DNS server
Firewall
Proxy server
Rate this question:
Replacing the most significant byte of each bit
Replacing the least significant byte of each bit
Replacing the most significant bit of each byte
Replacing the least significant bit of each byte
Rate this question:
Promiscuous
Full-duplex
Auto
Half-duplex
Rate this question:
Logic bomb
Rootkit
Virus
Trojan
Rate this question:
Group policy.
Cookies.
Cross-site scripting.
Corporate hardware firewalls.
Rate this question:
Proxy server
DHCP server
DNS server
Firewall
Rate this question:
Host-based firewall.
Antivirus.
HIPS.
HIDS.
Rate this question:
False negative
True negative
False positive
True positive
Rate this question:
A detailed process of recovering information or IT systems after a catastrophic event
An emergency plan that will allow the company to recover financially
A plan that is put in place to recover the company assets in an emergency
A plan that is mandated by law to ensure liability issues are addressed in a catastrophic event WBerlin Sans
Rate this question:
Full backups every day
Daily differential backups
Full backups weekly with differential backups daily
Weekly differential with incremental backups daily
Rate this question:
Running key cipher
Concealment cipher
One-time pad
Steganography
Rate this question:
To protect against the log file being changed
To demonstrate least privilege to management
To reduce network latency
To improve the server performance
Rate this question:
Cross-site scripting
Rootkits
Buffer overflows
SQL injection
Rate this question:
By department
By location
By role
By name
Rate this question:
Signature
Behavioral
Statistical
Anomaly
Rate this question:
Access logs
Performance log
Firewall logs
Antivirus logs
Rate this question:
Quiz Review Timeline (Updated): Apr 26, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.