Security+ – Comprehensive Multiple Choice Exam

/85

Security+ Comprehensive Multiple Choice Exam

With Over 170 questions, you will be given 85 questions to answer with a time limit of 85 minutes.

Questions and answers are RANDOMIZED to encourage better study habits instead of just memorizing them.

Passing Score is set to 85%.

 

 

1 / 85

Which of the following would be a common result of a successful vulnerability scan?

2 / 85

A recent audit has found that existing password policies do not include any restrictions on password attempts, and users are not required to periodically change their passwords. Which of the following would correct these policy issues? (Select TWO)

3 / 85

a company's security policy requires that login access should only be available if a person is physically within the same building as the server. Which of the following would be the BEST way to provide this requirement?

4 / 85

An organization maintains a large database of customer information for sales tracking and customer support. Which person in the organization would be responsible for managing the access rights to this data?

5 / 85

A user has assigned individual rights and permissions to a file on their network drive. The user adds three additional individuals to have read-only access to the file. Thich of the following would describe this access control model?

6 / 85

Which of these threat actors would be the MOST likely to deface a website to promote a political agenda?

7 / 85

A user connects to a third-party website and receives this message:

Your connection is not private.

NET:ERR_CERT_INVALID

Which of the following attacks would be the MOST likely reason for this message?

8 / 85

a security administrator is preparing a phishing email that will be sent to employees as part of a periodic security test. The email is spoofed to appear as an unknown thir-party and asks employees to immediately click a link or their state licensing will be revoked. Which of these social engineering principles are used by this email?

9 / 85

Which of the following standards provides information on privacy and managing PII?

10 / 85

Which of the following risk management strategies would include the purchase and installation of an NGFW?

11 / 85

Which of the following describes a monetary loss if one event occurs?

12 / 85

Which of the following would be the BEST option for application testing in an environment that is completely separated from the production network?

13 / 85

A data center manager has built a Faraday cage in the data center, and a set of application servers have been placed inside the Faraday cage. Which of the following would be the MOST likely reason for the data center manager to install this configuration of equipment?

14 / 85

A security administrator has identified the installation of a RAT on a database server and has quarantined the system. Which of the following should be followed to ensure that the integrity of the evidence is maintained?

15 / 85

A company's outgoing email server currently uses SMTP with no encryption. The security administrator would like to implement encryption between email clients without changing the existing server-to-server communication. Which of the following would be the BEST way to implement thisd requirement?

16 / 85

A remote user has received a text message requesting login details to the corporate VPN server. Which of the following would BEST describe this message?

17 / 85

a user has opened a helpdesk ticket complaining of poor system performance, excessive pop-up messages, and the cursor moving without anyone touching the mouse. This issue began after they opened a spreadsheet from a vendor containing part numbers and pricing information. Which of the following is MOST likely the cause of this user's issues?

18 / 85

A file server has a full backup performed each Monday at 1 AM. Incremental backups are performed at 1 AM on Tuesday, Wednesday, Thursday, and Friday. The system administrator needs to perform a full recovery of the file server on Thursday afternoon. How many backup sets would be required to complete the recovery?

19 / 85

An MSP is designing a new server room for a large company. Which of the following should be included in the design to provide redundancy? (Select TWO)

20 / 85

A system administrator would like to segment the network to give the marketing, accounting, and manufacturing departments their own private network. The network communication between departments would be restricted for additional security. Which of the following should be configured on this network?

21 / 85

A security administrator has identified a DoS attack against the company's web server from an IPv4 address on the Internet. Which of the following security tools would provide additional details about the attacker's location?  (Select TWO)

22 / 85

A government transport service has installed access points that support WPA3. Which of the following technologies would provide enhance security for PSK while WPA3?

23 / 85

A transportation company headquarters is located in an area with frequent power surges and outages. The security administrator is concerned about the potential for downtime and hardware failures. Which of the following would provide the most protection against these issues?  Select TWO.

24 / 85

A manufacturing company would like to track the progress of parts as they are used on an assembly line. Which of the following technologies would be the BEST choice for this task?

25 / 85

Which of the following would be the MAIN reasons why a system administrator would use a TPM when configuring full disk encryption?  (Select TWO)

26 / 85

Which of the following would be the BEST way to confirm the secure baseline of a deployed application instance?

27 / 85

A new malware variant takes advantage of a vulnerability in a popular email client. Once installed, the malware forwards all email attachments containing credit card information to an external email address. Which of the following would limit the scope of this attack?

28 / 85

A company would like to protect the data stored on laptops used in the field. Which of the following would be the BEST choice for this requirement?

29 / 85

A security administrator is designing a storage array that would maintain
an exact replica of all data without striping. The array needs to operate
normally if a single drive was to fail. Which of the following would be the
BEST choice for this storage system?

30 / 85

A user downloaded and installed a utility for compressing and decompressing files. Immediately after installing the utility, the user's overall workstation performance degraded, and it now takes twice as much time to perform any tasks on the compter. Which of the following is the BEST description of this malware infection?

31 / 85

An organization has developed an in-house mobile device app for order processing. The developers would like the app to identify revoked server certificates without sending any traffic over the corporate Internet connection. Which of the following MUST be configured to allow this functionality?

32 / 85

Which of the following would be the MOST likely result of plaintext application communication?

33 / 85

A company is deploying a new mobile application to all of its employees in the field. Some of the problems associated with this rollout include:

  • The company does not have a way to manage the mobile devices in the field
  • Company data on mobile devices in the field introduces additional risk
  • Team members have many different kinds of mobile devices

Which of the following deployment models would address these concerns?

34 / 85

A security incident has occurred on a file server. Which of the following data sources should be gathered to address file storage volatility? (Select TWO)

35 / 85

A company encourages users to encrypt all of their confidential materials on a central server. The organization would like to enable key escrow as a backup. Which of these keys should the organization place in escrow?

36 / 85

Which of these cloud deployment models would share resources between a private virtualized data center and externally available cloud services?

37 / 85

Sam, a security administrator, is configuring an IPsec tunnel to a remote site. Which protocol should she enable to protect all of the data traversing the VPN tunnel?

38 / 85

A company has connected their wireless access points and have enable WPS. Which of the following security issues would be associated with this configuration?

39 / 85

Jennifer is reviewing this security log from her IPS:

ALERT 2018-06-01 13:07:09 [163bcf65118-179b547b]
Cross-Site Scripting in JSON Data
22.43.112.74:3332 -> 64.235.145.35:80
URL/index.html - Method POST - Query String "-"
User Agent: curl/7.21.3 (i386-redhat-linux-gnu) libcurl/7.21.3
NSS/3.13.1.0 zlib/1.2.5 libidn/1.19 libssh2/1.2.7
Detail: token=""

Which of the following can be determined from this log information? (Select TWO)

 

40 / 85

A user in the accounting department would like to send a spreadsheet with sensitive information to a list of third-party vendors. Which of the following could be used to transfer this spreadsheet to the vendors?

41 / 85

A security administrator has been asked to respond to a potential security breach of the company's database, and they need to gather the most volatile data before powering down the database servers. In which order should they collect this information?

42 / 85

A security administrator would like to minimize the number of certificate status checks made by web clients tot he certificate authority. Which of the following would be the BEST option for this requirement?

43 / 85

a company is implementing a public file-storage and cloud-based sharing service but does not want to build a separate authentication front-end. Instead, the company would like users to authenticate with an existing account on a trusted third-party website. Which of the following should the company implement?

44 / 85

A transportation company has moved their reservation system to a
cloud-based infrastructure. The security manager would like to monitor
data transfers, identify potential threats, and ensure that all data transfers
are encrypted. Which of the following would be the BEST choice for
these requirements?

45 / 85

Cameron, a security administrator, is reviewing a report that shows a number of devices on internal networks attempting to connect with servers in that data center network. Which of the following security controls should Cameron add to prevent internal systems from accessing data center devices?

46 / 85

A system administrator is implementing a password policy that would require letters, numbers, and special characters to be included in every password. Which of the following controls MUST be in place to enforce this password policy?

47 / 85

A security manager ahs created a report showing intermittent network communication from external IP addresses to certain workstations on the internal network. These traffic patterns occur at random times during the day. Which of the following would be the MOST likely reason for these traffic patterns?

48 / 85

Which of these threat actors would be MOST likely to attack systems for direct financial gain?

49 / 85

A server administrator at a bank has noticed a decrease in the number of visitors to the bank website. Additional research shows that users are being directed to a different IP address than the bank's web server. Which of the following would MOST likely describe this attack?

50 / 85

A security manager would like to ensure that unique hashes are used with an application login process. Which of the following would be the BEST way to add random data when generating a set of stored password hashes?

51 / 85

 

A user with restricted access has typed this text in a serach field of an interanl web-based application:

USER77 or '1'='1

After submitting this search request, all of the database records are displayed on the screen. Which of the following would BEST describe this search?

52 / 85

An organization has identified a security breach and has removed the affected servers from the network. Which of the following is the NEXT step in the IR process?

53 / 85

A manufacturing company would like to use an existing router to separate a corporate network and a manufacturing floor that use the same physical switch. The company does not want to install any additional hardware. Which of the following would be the BEST choice for this segmentation?

54 / 85

The embedded OS in a company's time clock appliance is configured to reset the file system and reboot when a file system error occurs. On one of the time clocks, this file system error occurs during the startup process and causes the system to constantly reboot. Which of the following BEST describes this issue?

55 / 85

Which of these would be used to provide HA for a web-based database application?

56 / 85

A system administrator has protected a set of system backups with an encryption key. The system administrator used the same key when restoring files from this backup. Which of the following would BEST describe this encryption type?

57 / 85

A Linux administrator has received a ticket complaining of response issues with a database server. After connecting to the server, the administrator views this information:

Filesystem Size Used Avail Use% Mounted on
/dev/xvda1 158G 158G 0 100% /

Which of the following would BEST describe this information?

58 / 85

Which of the following vulnerabilities would be the MOST significant security concern when protecting against a competitor?

59 / 85

Which of the following BEST describes the modification of application source code that removes white space, shortens variable names, and rearranges the text into a compact format?

60 / 85

A user in the mail room has reported an overall slowdown of his shipping management software. An anti-virus scan did not identify any issues, but a more thorough malware scan identified a kernal driver that was not part of the the original operating system installation. Which of the following malware was installed on this system?

61 / 85

a system administrator is implementing a fnigerprint scanner to provide access to the data center. Which of these metrics should be kept at a minimum in order to prevent unauthorized persons from accessing the data center?

62 / 85

A recent security audit has discovered email addresses and passwords located in a packet capture. Which of the following did the audit identify?

63 / 85

A Linux administrator is downloading an updated version of her Linux distribution. The download site shows a link to the ISO and a SHA256 hash value. Which of these would describe the use of this has value?

64 / 85

A device is exhibiting intermittent connectivity when viewing remote websites. A security administrator views the local device ARP table:

Internet Address Physical Address
192.168.1.1 60:3d:26:69:71:fc
192.168.1.101 e2:c3:53:79:4c:51
192.168.1.102 7a:3b:8f:21:86:57
192.168.1.103 60:3d:26:69:71:fc
192.168.1.104 00:80:92:c7:c8:49
192.168.1.105 d0:81:7a:d3:f0:d5

Which of the following would be the MOST likely explanation of this connectivity issue?

65 / 85

Which of the following would be considered multi-factor authentication?

66 / 85

A private company uses an SSL proxy to examine the contents of an encrypted application during transmission. How could the application developers prevent the use of this proxy examination in the future?

67 / 85

A company maintains a server farm in a large data center. These servers are for internal use only and are not accessible externally. The security team has discovered that a group of servers was breached before the latest updates were applied. Breach attempts were not logged on any other servers. Which of these threat actors would be MOST likely involved in this breach?

68 / 85

An attacker calls into a company's help desk and pretends to be the director of the company's manufacturing department. The attacker states that they have forgotten their password and they need to have the password reset quickly for an important meeting. What kind of attack would BEST describe this phone call?

69 / 85

A network administrator has installed a new access point, but only a portion of the wireless devices are able to connect to the network. Other devices can see the access point, but they are not able to connect even when using the correct wireless settings. Which of the following security features was MOST likely enabled?

70 / 85

A security administrator has created a new policy that prohibits the use of MD5 hashes due to collision problem. Which of the following describes the reason for this new policy?

71 / 85

A security administrator would like to create an access control where each file or folder is assigned a security clearance lever, such as 'confidential' or 'secret'. The security administrator would then assign a maximum security level to each user. What type of access control would be used in this network.

72 / 85

A security administrator has installed a new firewall to protect a web server VLAN. The application owner requires that all web server sessions communicate over an encrypted channel. Which of these rules should the security administrator include in the firewall rulebase? (Select TWO)

73 / 85

Elizabeth, a security administrator, is concerned about the potential for data exfiltration using external storage drives. Which of the following would be the BEST way to prevent this method of data exfiltration?

74 / 85

The security policies in a manufacturing company prohibit the transmission of customer information. However, a security administrator has received an alert that credit card numbers were transmitted as an email attachment. Which of the following was the MOST likely source of this alert message?

75 / 85

Last month, a finance company disposed of seven-year old printed customer account summaries that were no longer required for auditing purposes. A recent onlince search has now found that images of these documents are available as downloadable torrents. Which of the following would MOST likely has prevented this information breach?

76 / 85

A security administrator needs to identify all references to a Javascript file in the HTML of a web page. Which of the following tools should be used to view the source of the web page and search through the file for a specific filename? (Select TWO)

77 / 85

A company is designing an application that will have a high demand and will require significant computing resources during the summer. During the winter, there will be little to no application use and resource use should be minimal. Which of these characteristics BEST describe this application requirement?

78 / 85

A financial services company is headquartered in an area with a high occurrence of tropical storms and hurricanes. Which of the following would be MOST important when restoring services disabled by a storm?

79 / 85

Which of the following would be the BEST way to protect credit card account information when performing real-time purchase authorizations?

80 / 85

A company is launching a new internal application that will not start until a username and password is entered and a smart card is plugged into the computer. Which of the following BEST decribes this process?

81 / 85

A security administrator attends an annual industry convention with other security professionals from around the world. Which of the following attacks would be MOST likely in this situation?

82 / 85

How can a company ensure that all data on a mobile device is unrecoverable if the device is lost or stolen?

83 / 85

Which of the following applies scientific principles to provide a post-event analysis of an intrusion?

84 / 85

An online retailer is planning a penetration test as part of their PCI DSS validation. A third-party organization will be performing the test, and the online retailer has provided the Internet-facing IP address for their public web servers but no other details. What penetration testing methodology is the online retailer using?

85 / 85

A company is concerned their EDR solution will not be able to stop more advanced ransomware variants. Technicians have created a backup and restore utility that will get the most systems up and running less than an hour after an attack. What type of security control is associated with this restore process?

Your score is