Do You Know About SEC+ Study Guide G Quiz

100 Questions | Total Attempts: 84

SettingsSettingsSettings
Do You Know About SEC+ Study Guide G Quiz

To the entire tech crazy people out there who want to see how much they really know about sec+, take this quiz. It is specifically designed to help you find out your knowledge that is based on Sec+ study guide.


Questions and Answers
  • 1. 
    QUESTION NO: 601 A user ID, PIN, and a palm scan are all required to authenticate a system. Which of the following is this an example of?
    • A. 

      SSO

    • B. 

      Two-factor authentication

    • C. 

      Single-factor authentication

    • D. 

      Three-factor authentication

  • 2. 
    QUESTION NO: 602 Which of the following would be disabled to prevent SPIM?
    • A. 

      P2P

    • B. 

      ActiveX controls

    • C. 

      Instant messaging

    • D. 

      Internet mail

  • 3. 
    QUESTION NO: 603 A user sees an MD5 hash number beside a file that they wish to download. Which of the following BEST describes a hash?
    • A. 

      A hash is a unique number that is generated based upon the TCP/IP transmission header and should be verified beforedownloaD.

    • B. 

      A hash is a unique number that is generated based upon the files contents and used as the SSL key duringdownloaD

    • C. 

      A hash is a unique number that is generated after the file has been encrypted and used as the SSL key duringdownloaD.

    • D. 

      A hash is a unique number that is generated based upon the files contents and should be verified after download.

  • 4. 
    QUESTION NO: 604 According to a good disaster recovery plan, which of the following must happen during a power outage before an uninterruptible power supply (UPS) drains its battery?
    • A. 

      The PKI CA is relocateD

    • B. 

      The backup generator activates.

    • C. 

      The single point of failure isremedieD

    • D. 

      Full electrical service isrestoreD

  • 5. 
    QUESTION NO: 605 Which of the following would give a technician the MOST information regarding an external attack on the network?
    • A. 

      Internet content filter

    • B. 

      Proxy server

    • C. 

      NIDS

    • D. 

      Firewall

  • 6. 
    Which of the following would BEST prevent night shift workers from logging in with IDs and passwords stolen from the day shift workers?
    • A. 

      Account expiration

    • B. 

      Time of day restriction

    • C. 

      Account lockout

    • D. 

      Domain password policy

  • 7. 
    QUESTION NO: 607 Which of the following would BEST ensure that users have complex passwords?
    • A. 

      ACL

    • B. 

      Domain password policy

    • C. 

      Logical tokens

    • D. 

      Time of day restrictions

  • 8. 
    QUESTION NO: 608 A technician finds that a malicious user has introduced an unidentified virus to a single file on the network. Which of the following would BEST allow for the user to be identified?
    • A. 

      Access logs

    • B. 

      Performance log

    • C. 

      Firewall logs

    • D. 

      Antivirus logs

  • 9. 
    QUESTION NO: 609 Which of the following would BEST allow an administrator to find the IP address of an external attacker?
    • A. 

      Antivirus logs

    • B. 

      DNS logs

    • C. 

      Firewall logs

    • D. 

      Performance logs

  • 10. 
    QUESTION NO: 610 After performing a vulnerability analysis and applying a security patch, which of the following nonintrusive actions should an administrator take to verify that the vulnerability was truly removed?
    • A. 

      Apply a security patch from the vendor.

    • B. 

      Perform a penetration test.

    • C. 

      Repeat the vulnerability scan.

    • D. 

      Update the antivirus definition file.

  • 11. 
    QUESTION NO: 611 Which of the following could be used by a technician needing to send data while ensuring that any data tampering is easily detectible?
    • A. 

      NTLM

    • B. 

      LANMAN

    • C. 

      SHA-1

    • D. 

      AES

  • 12. 
    QUESTION NO: 612 Which of the following BEST allows for a high level of encryption?
    • A. 

      AES with ECC

    • B. 

      DES with SHA-1

    • C. 

      PGP with SHA-1

    • D. 

      3DES with MD5

  • 13. 
    QUESTION NO: 613 Which of the following is the primary security risk associated with removable storage?
    • A. 

      Availability

    • B. 

      Confidentiality

    • C. 

      Injection

    • D. 

      Integrity

  • 14. 
    QUESTION NO: 614 After reading about the vulnerability issues with open SMTP relays, a technician runs an application to see if port 25 is open. This would be considered a:
    • A. 

      Networkmappe

    • B. 

      Protocol analyzer.

    • C. 

      Vulnerabilityscan.

    • D. 

      Port scan.

  • 15. 
    QUESTION NO: 615 A companys accounting application requires users to be administrators for the software to function correctly. Because of the security implications of this, a network administrator builds a user profile which allows the user to still use the application but no longer requires them to have administrator permissions. Which of the following is this an example of?
    • A. 

      Configuration baseline

    • B. 

      Group policy

    • C. 

      Security template

    • D. 

      Privilege escalation

  • 16. 
    QUESTION NO: 616 Which of the following backup techniques resets the archive bit and allows for the fastest recovery?
    • A. 

      Full backup

    • B. 

      Shadow copies

    • C. 

      Differential backup

    • D. 

      Incremental backup

  • 17. 
    QUESTION NO: 617 The company policy for availability requires full backups on Sunday and incremental backups each week night at 10 p.m. The file server crashes on Wednesday afternoon; how many tapes will the technician need to restore the data on the file server for Thursday morning?
    • A. 

      One

    • B. 

      Two

    • C. 

      Three

    • D. 

      Four

  • 18. 
    QUESTION NO: 618 A company is addressing backup and recovery issues. The company is looking for a compromise between speed of backup and speed of recovery. Which of the following is the BEST recommendation?
    • A. 

      Full backups every day

    • B. 

      Daily differential backups

    • C. 

      Full backups weekly with differential backups daily

    • D. 

      Weekly differential with incremental backups daily

  • 19. 
    QUESTION NO: 619 Which of the following would define document destruction requirements?
    • A. 

      ACL

    • B. 

      User access and rights review policies

    • C. 

      Group policy

    • D. 

      Storage and retention policies

  • 20. 
    QUESTION NO: 620 Part of a standard policy for hardening workstations and servers should include applying the company security template and:
    • A. 

      Installing the NIDS.

    • B. 

      Closing unnecessary network ports.

    • C. 

      Applying all updates, patches andhotfixes immediately.

    • D. 

      Disabling SSID broadcast.

  • 21. 
    QUESTION NO: 621 Setting a baseline is required in which of the following? (Select TWO).
    • A. 

      Anomaly-based monitoring

    • B. 

      NIDS

    • C. 

      Signature-based monitoring

    • D. 

      NIPS

    • E. 

      Behavior-based monitoring

  • 22. 
    QUESTION NO: 622 Which of the following hidden programs gathers information with or without the users knowledge with the primary purpose of advertising?
    • A. 

      Worm

    • B. 

      Trojan

    • C. 

      Spyware

    • D. 

      Virus

  • 23. 
    QUESTION NO: 623 Which of the following provides best practice with a wireless network?
    • A. 

      WPA

    • B. 

      WPA with RADIUS

    • C. 

      3DES with RADIUS

    • D. 

      WEP 128-bit

  • 24. 
    QUESTION NO: 624 Which of the following sites has the means (E. g. equipment, software, and communications) to facilitate a full recovery within minutes?
    • A. 

      Warm site

    • B. 

      Hot site

    • C. 

      Reciprocal site

    • D. 

      Cold site

  • 25. 
    QUESTION NO: 625 When conducting an environmental security assessment, which of the following items should be included in the assessment? (Select THREE).
    • A. 

      HVAC

    • B. 

      Card access system

    • C. 

      Off-site data storage

    • D. 

      Logical access

    • E. 

      Utilities

    • F. 

      Fire detection

Back to Top Back to top