
MONDAY - Security+ Pre-Assessment
Quiz by Gareth Marchant
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Which of the following categories of control describe surveillance cameras?
Technical
Administrative
Physical
Directive
60s - Q2
The term AAA represents:
Accountability, Authorization, Auditing
Authorization, Authentication, Auditing
Authentication, Authorization, Accounting
Auditing, Assessment, Action
60s - Q3
This threat actor group is focused on monetization
Hacktivist
Organized Crime
Shadow IT
Nation State
60s - Q4
An adversary gains access to a target organization by pushing malware from the online ordering website of a sandwich shop frequented by the target organization's employees.
Phishing
Typosquatting
Watering Hole
Impersonation
60s - Q5
Which of the following formats is most closely associated with deploying resources using IaC?
SAML
XML
YAML
YARA
60s - Q6
This method is often used to secure credit card data
Hashing
Obfuscation
Tokenization
De-anonymization
60s - Q7
A unique feature of Wi-Fi Protected Access 3
Data Loss Prevention
Simultaneous Authentication of Equals
AAA
RADIUS
60s - Q8
Which of the following can be used to help prioritize work done to remediate an identified vulnerability?
Certification
Input Validation
DMARC
CVSS
60s - Q9
This item is generally associated with the backup sets used during disaster recovery
Data Subject
ARO
Service Level Agreements
RPO
60s - Q10
Which of the following roles is accountable for the protection of sensitive data?
Custodian
Owner
Processor
Subject
60s - Q11
Which of the following best defines non-repudiation
Cannot deny
Cannot confirm
Cannot access
Cannot authenticate
60s - Q12
What control objective does a "cameras in use" sign represent?
Detective
Preventive
Deterrent
Directive
60s - Q13
Which of the following best characterizes a virus?
Requires user interaction
Self-propagates
Typically causes DOS
Steals private data
60s - Q14
The most effective method for breaching a password
Spraying
Brute force
Social engineering
Dictionary attack
60s - Q15
Which IEEE standard defines NAC?
802.11x
802.3
802.5
802.1x
60s