
Security+ Practice Assessment #2
Quiz by Gareth Marchant
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
100 questions
Show answers
- Q1You are a cybersecurity analyst for a government agency that handles classified information. One of your colleagues accidentally sent an email containing sensitive documents to an unintended recipient outside the agency. What aspect of the CIA triad is most directly affected by this incident?ConfidentialityAccountabilityAvailabilityIntegrity60s
- Q2Which of the following is commonly implemented to support non-repudiation in email communication?Symmetric keysDigital signaturesFirewallsIntrusion detection systems (IDS60s
- Q3You are the system administrator for a large organization that uses various operating systems across its network. You receive a security advisory indicating that a critical vulnerability has been discovered in the operating system used on your organization's servers. The vulnerability allows remote attackers to execute arbitrary code with elevated privileges. What is the appropriate course of action to mitigate this operating system vulnerability?Implement strict firewall rules to temporarily block all incoming network traffic to the affected servers.Disconnect all affected servers from the network to prevent remote access until a solution is found.Ignore the advisory since information regarding critical vulnerabilities is only provided via public information notices (PIN).Schedule a maintenance window to promptly apply the latest security patches and updates to the affected servers.60s
- Q4Which of the following techniques includes a fraudulent caller manipulating a recipient into revealing sensitive information, such as passwords or financial details?BluesnarfingVoIP hijackingWar dialingVishing60s
- Q5You are the IT administrator for a medium-sized company. Your company's file server contains sensitive financial data that should only be accessible to finance department members and authorized executives. You are tasked with implementing access controls to enforce this policy. Which of the following is the most appropriate next step?Create a user group for the finance department and add authorized users to it.Open the financial data directory to everyone and rely on individual user account permissions to restrict access.Use a default ACL that allows everyone access to the financial data and then monitor for unauthorized access.Create a separate file server for the finance department to ensure data isolation.60s
- Q6You are the IT security manager for a manufacturing company that relies on IoT devices to monitor and control critical industrial processes. Recently, you discovered that some IoT devices have become part of a botnet and are participating in distributed denial-of-service (DDoS) attacks against external targets. What is the most likely security issue that led to this situation, and how can you mitigate it?Poorly configured firewallsLack of network segmentationUnauthorized physical accessInadequate firmware updates60s
- Q7Which of the following tools or techniques is associated with passive monitoring?Network Address Translation (NAT)Denial-of-ServicePort scannersIntrusion Detection System (IDS60s
- Q8What is a common security measure used to protect data at rest?Using intrusion detection systems (IDS) to monitor data access.Implementing strong access controls for data access.Regularly deleting data to reduce the amount at rest.Encrypting data during transmission.60s
- Q9You are the security analyst for a small software development company and have identified multiple vulnerabilities in the company's internally developed software. You assess these vulnerabilities based on their impact, ease of exploitation, and the components they affect. One of the vulnerabilities allows remote code execution vulnerability, potentially resulting in a significant sensitive data breach. However, the vulnerability is complex and would require a skilled attacker to exploit. Another vulnerability allows unauthorized access to a non-critical system component but is relatively easy to exploit. Your team has limited resources to address these vulnerabilities promptly. How should you proceed?Prioritize the remote code execution vulnerability as it has a higher impact potential, even if it's harder to exploit.Delay addressing both vulnerabilities until additional resources become available.Prioritize both vulnerabilities equally to maintain a balanced vulnerability management approach.Prioritize the unauthorized access vulnerability because it is easier to exploit and poses an immediate risk.60s
- Q10What distinguishes a Risk Register from Key Risk Indicators (KRIs)?A Risk Register uses qualitative assessments. KRIs rely on quantitative data.A Risk Register is a tool for compliance monitoring. KRIs are used for financial analysis.A Risk Register is focused on identifying opportunities. KRIs assess threats to an organization.A Risk Register tracks potential risks. KRIs measure the effectiveness of risk mitigation.60s
- Q11ABC Corporation operates a data center that houses critical servers and infrastructure. They have identified the risk of a server outage due to various factors, such as hardware failures and natural disasters. The estimated cost of a single server outage is $50,000, and the annual probability of a server outage is 10%. What is the Annualized Loss Expectancy (ALE) for the risk of a server outage at ABC Corporation's data center?$25,000.00$50,000.00$10,000.00$5,000.00120s
- Q12XYZ Retail is concerned about potential financial losses resulting from credit card fraud. They estimate that the average financial impact of a credit card fraud incident is $20,000. The likelihood of a credit card fraud incident occurring in any year is 5%. What is the Annualized Loss Expectancy (ALE) for the risk of credit card fraud at XYZ Retail?$20,000.00$4,000.00$1,000.00$2,000.00120s
- Q13You are a security administrator for a healthcare organization, and you need to securely share a patient's medical records with a partner clinic across town. The partner clinic has provided you with their public key. What asymmetric encryption concept should you use to protect the patient's data, and why?Symmetric encryption, to generate a shared secret key and use it for encryption as it is more efficient for data transmissionOne-time pad encryption, to generate a unique one-time pad for each record and use it for encryption to maximize securityPublic key encryption, to use the partner clinic's public key to encrypt the patient's dataPassword-based encryption, to encrypt the data with a strong password that is securely shared between your organization and the partner clinic60s
- Q14Which of the following is a common challenge when dealing with legacy applications in change management?Legacy applications are typically more secure than modern applications.Legacy applications are easier to update and maintain.Legacy applications require fewer compatibility checks.Legacy applications often have outdated documentation.60s
- Q15Which of the following is a potential benefit of key escrow?Enhanced security by preventing unauthorized access to keys.Reduced dependence on encryption technology.Simplified key management and distribution.Complete anonymity in secure communications.60s