placeholder image to represent content

Security+ Practice Assessment #2

Quiz by Gareth Marchant

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
100 questions
Show answers
  • Q1
    You are a cybersecurity analyst for a government agency that handles classified information. One of your colleagues accidentally sent an email containing sensitive documents to an unintended recipient outside the agency. What aspect of the CIA triad is most directly affected by this incident?
    Confidentiality
    Accountability
    Availability
    Integrity
    60s
  • Q2
    Which of the following is commonly implemented to support non-repudiation in email communication?
    Symmetric keys
    Digital signatures
    Firewalls
    Intrusion detection systems (IDS
    60s
  • Q3
    You are the system administrator for a large organization that uses various operating systems across its network. You receive a security advisory indicating that a critical vulnerability has been discovered in the operating system used on your organization's servers. The vulnerability allows remote attackers to execute arbitrary code with elevated privileges. What is the appropriate course of action to mitigate this operating system vulnerability?
    Implement strict firewall rules to temporarily block all incoming network traffic to the affected servers.
    Disconnect all affected servers from the network to prevent remote access until a solution is found.
    Ignore the advisory since information regarding critical vulnerabilities is only provided via public information notices (PIN).
    Schedule a maintenance window to promptly apply the latest security patches and updates to the affected servers.
    60s
  • Q4
    Which of the following techniques includes a fraudulent caller manipulating a recipient into revealing sensitive information, such as passwords or financial details?
    Bluesnarfing
    VoIP hijacking
    War dialing
    Vishing
    60s
  • Q5
    You are the IT administrator for a medium-sized company. Your company's file server contains sensitive financial data that should only be accessible to finance department members and authorized executives. You are tasked with implementing access controls to enforce this policy. Which of the following is the most appropriate next step?
    Create a user group for the finance department and add authorized users to it.
    Open the financial data directory to everyone and rely on individual user account permissions to restrict access.
    Use a default ACL that allows everyone access to the financial data and then monitor for unauthorized access.
    Create a separate file server for the finance department to ensure data isolation.
    60s
  • Q6
    You are the IT security manager for a manufacturing company that relies on IoT devices to monitor and control critical industrial processes. Recently, you discovered that some IoT devices have become part of a botnet and are participating in distributed denial-of-service (DDoS) attacks against external targets. What is the most likely security issue that led to this situation, and how can you mitigate it?
    Poorly configured firewalls
    Lack of network segmentation
    Unauthorized physical access
    Inadequate firmware updates
    60s
  • Q7
    Which of the following tools or techniques is associated with passive monitoring?
    Network Address Translation (NAT)
    Denial-of-Service
    Port scanners
    Intrusion Detection System (IDS
    60s
  • Q8
    What is a common security measure used to protect data at rest?
    Using intrusion detection systems (IDS) to monitor data access.
    Implementing strong access controls for data access.
    Regularly deleting data to reduce the amount at rest.
    Encrypting data during transmission.
    60s
  • Q9
    You are the security analyst for a small software development company and have identified multiple vulnerabilities in the company's internally developed software. You assess these vulnerabilities based on their impact, ease of exploitation, and the components they affect. One of the vulnerabilities allows remote code execution vulnerability, potentially resulting in a significant sensitive data breach. However, the vulnerability is complex and would require a skilled attacker to exploit. Another vulnerability allows unauthorized access to a non-critical system component but is relatively easy to exploit. Your team has limited resources to address these vulnerabilities promptly. How should you proceed?
    Prioritize the remote code execution vulnerability as it has a higher impact potential, even if it's harder to exploit.
    Delay addressing both vulnerabilities until additional resources become available.
    Prioritize both vulnerabilities equally to maintain a balanced vulnerability management approach.
    Prioritize the unauthorized access vulnerability because it is easier to exploit and poses an immediate risk.
    60s
  • Q10
    What distinguishes a Risk Register from Key Risk Indicators (KRIs)?
    A Risk Register uses qualitative assessments. KRIs rely on quantitative data.
    A Risk Register is a tool for compliance monitoring. KRIs are used for financial analysis.
    A Risk Register is focused on identifying opportunities. KRIs assess threats to an organization.
    A Risk Register tracks potential risks. KRIs measure the effectiveness of risk mitigation.
    60s
  • Q11
    ABC Corporation operates a data center that houses critical servers and infrastructure. They have identified the risk of a server outage due to various factors, such as hardware failures and natural disasters. The estimated cost of a single server outage is $50,000, and the annual probability of a server outage is 10%. What is the Annualized Loss Expectancy (ALE) for the risk of a server outage at ABC Corporation's data center?
    $25,000.00
    $50,000.00
    $10,000.00
    $5,000.00
    120s
  • Q12
    XYZ Retail is concerned about potential financial losses resulting from credit card fraud. They estimate that the average financial impact of a credit card fraud incident is $20,000. The likelihood of a credit card fraud incident occurring in any year is 5%. What is the Annualized Loss Expectancy (ALE) for the risk of credit card fraud at XYZ Retail?
    $20,000.00
    $4,000.00
    $1,000.00
    $2,000.00
    120s
  • Q13
    You are a security administrator for a healthcare organization, and you need to securely share a patient's medical records with a partner clinic across town. The partner clinic has provided you with their public key. What asymmetric encryption concept should you use to protect the patient's data, and why?
    Symmetric encryption, to generate a shared secret key and use it for encryption as it is more efficient for data transmission
    One-time pad encryption, to generate a unique one-time pad for each record and use it for encryption to maximize security
    Public key encryption, to use the partner clinic's public key to encrypt the patient's data
    Password-based encryption, to encrypt the data with a strong password that is securely shared between your organization and the partner clinic
    60s
  • Q14
    Which of the following is a common challenge when dealing with legacy applications in change management?
    Legacy applications are typically more secure than modern applications.
    Legacy applications are easier to update and maintain.
    Legacy applications require fewer compatibility checks.
    Legacy applications often have outdated documentation.
    60s
  • Q15
    Which of the following is a potential benefit of key escrow?
    Enhanced security by preventing unauthorized access to keys.
    Reduced dependence on encryption technology.
    Simplified key management and distribution.
    Complete anonymity in secure communications.
    60s

Teachers give this quiz to your class