100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Sec+ Final Exam Questions With Correct Answers

Beoordeling
-
Verkocht
-
Pagina's
30
Cijfer
A+
Geüpload op
19-08-2024
Geschreven in
2024/2025

Sec+ Final Exam Questions With Correct Answers Analyze the following scenarios and determine which attacker used piggy backing. A.) On the way to a meeting in a restricted area of a government facility, a contractor holds open a gate for a person in a military uniform, who approaches the entry point at a jog, flashing a badge just outside of the readable range. B.) A government employee is late for a meeting in a restricted area of a military installation. Preoccupied with making the meeting on time, the employee does not notice when the gate has not closed and someone enters the restricted area. C.) An employee leaves the workstation to use the restroom. A coworker notices that the employee has forgotten to lock the workstation, and takes advantage of the user's permissions. D.) Several prospective interns are touring the operations floor of a large tech firm. One of them seems to be paying especially close attention to the employees. - answerA.) On the way to a meeting in a restricted area of a government facility, a contractor holds open a gate for a person in a military uniform, who approaches the entry point at a jog, flashing a badge just outside of the readable range. What type of phishing attack targets upper-level managment? A.) Pharming B.) Credential harvesting C.) Whaling D.) Typosquatting - answerC.) Whaling An end-user has enabled cookies for several e-commerce websites and has started receiving targeted ads. The ads do not trouble the user until, when trying to access an e-commerce site, the user gets several pop-up ads that automatically redirect the user to suspicious sites the user did not intend to visit. What is the most likely explanation for this phenomenon? A.) tracking cookies have infected the user's computer. B.) Ransomeware has infected the user's computer. C.) Spyware has infected the user's computer. EXAM STUDY MATERIALS 8/7/2024 11:29 AM D.) Crypto-malware has infected the user's computer. - answerC.) Spyware has infected the user's computer A hacker gains access to a database of usernames for a target company and then begins combining common, weak passwords with each username to attempt authentication. The hacker conducts what type of attack? A.) Password spraying B.) Brute force attack C.) Dictionary attack D.) Rainbow table attack - answerA.) Password spraying When monitoring API usage on a system, an engineer notices a very high error rate. The application's latency and thresholds appear to be normal. What does the engineer determine to be the cause? A.) Overloaded system B.) Security issues C.) Number of requests D.) Service responses - answerOverloaded system, Security issues A user at a realtor's office contacts their IT department to report that they are not able to copy contract files to a USB flash drive to take home. Which explanation does the IT representative share with the user? A.) Data loss prevention prevents file copying. B.) Mobile device management restricts the use of a portable USB device. C.) A compromised private key has created a trust issue. D.) The file copy process has been allow-listed. - answerA.) Data loss prevention prevents file copying An employee that carries a company credit card learns that the card has become compromised. The employee only remembers fueling a company vehicle. Consider the following viable methods and determine which method compromised the card. Card cloning Data blocker Proximity reader EXAM STUDY MATERIALS 8/7/2024 11:29 AM Card skimming - answercard skimming Identify the type of attack where malware forces a legitimate process to load a malicious link library. A.) DLL injection B.) Pass the Hash (PtH) C.) Null pointer dereferencing D.) Overflow attack - answerA.) DLL injection What type of attack replays a cookie? A.) Cross-site request forgery (CSRF or XSRF) B.) Clickjacking C.) Secure Sockets Layer (SSL) strip attack D.) Session hijacking - answerD.) Session hijacking After several users call to report dropped network connections on a local wireless network, a security analyst scans network logs and discovers that multiple unauthorized devices were connecting to the network and overwhelming it via a smartphone tethered to the network, which provided a backdoor for unauthorized access. How would this device be classified? A.) A switched port analyzer (SPAN)/mirror port B.) A spectrum analyzer C.) A rogue access point (AP) D.) A thin wireless access point (WAP) - answerC.) A rouge access point (AP) A hacker places a false name:IP address mapping in an operating system's HOSTS file, redirecting traffic from a legitimate IP address to a malicious IP address. What type of attack did the hacker perform? A.) Domain hijacking B.) Domain name system client cache (DNS) poisoning C.) Rogue dynamic host configuration protocol (DHCP) D.) Address Resolution Protocol (ARP) poisoning - answerB.) Domain name system client cache (DNS) poisoning IT staff reviews security alerts received for a monitoring system and discovers that uncommon firewall ports on several Windows workstations and a server have been opened and are being accessed by a malicious process. What do

Meer zien Lees minder
Instelling
SEC +
Vak
SEC +

Voorbeeld van de inhoud

EXAM STUDY MATERIALS 8/7/2024 11:29 AM


Sec+ Final Exam Questions With Correct
Answers


Analyze the following scenarios and determine which attacker used piggy backing.
A.) On the way to a meeting in a restricted area of a government facility, a contractor holds open
a gate for a person in a military uniform, who approaches the entry point at a jog, flashing a
badge just outside of the readable range.
B.) A government employee is late for a meeting in a restricted area of a military installation.
Preoccupied with making the meeting on time, the employee does not notice when the gate has
not closed and someone enters the restricted area.
C.) An employee leaves the workstation to use the restroom. A coworker notices that the
employee has forgotten to lock the workstation, and takes advantage of the user's permissions.
D.) Several prospective interns are touring the operations floor of a large tech firm. One of them
seems to be paying especially close attention to the employees. - answer✔✔A.) On the way to a
meeting in a restricted area of a government facility, a contractor holds open a gate for a person
in a military uniform, who approaches the entry point at a jog, flashing a badge just outside of
the readable range.
What type of phishing attack targets upper-level managment?
A.) Pharming
B.) Credential harvesting
C.) Whaling

D.) Typosquatting - answer✔✔C.) Whaling
An end-user has enabled cookies for several e-commerce websites and has started receiving
targeted ads. The ads do not trouble the user until, when trying to access an e-commerce site, the
user gets several pop-up ads that automatically redirect the user to suspicious sites the user did
not intend to visit. What is the most likely explanation for this phenomenon?
A.) tracking cookies have infected the user's computer.
B.) Ransomeware has infected the user's computer.
C.) Spyware has infected the user's computer.

, EXAM STUDY MATERIALS 8/7/2024 11:29 AM

D.) Crypto-malware has infected the user's computer. - answer✔✔C.) Spyware has infected the
user's computer
A hacker gains access to a database of usernames for a target company and then begins
combining common, weak passwords with each username to attempt authentication. The hacker
conducts what type of attack?
A.) Password spraying
B.) Brute force attack
C.) Dictionary attack

D.) Rainbow table attack - answer✔✔A.) Password spraying
When monitoring API usage on a system, an engineer notices a very high error rate. The
application's latency and thresholds appear to be normal. What does the engineer determine to be
the cause?
A.) Overloaded system
B.) Security issues
C.) Number of requests

D.) Service responses - answer✔✔Overloaded system,
Security issues
A user at a realtor's office contacts their IT department to report that they are not able to copy
contract files to a USB flash drive to take home. Which explanation does the IT representative
share with the user?
A.) Data loss prevention prevents file copying.
B.) Mobile device management restricts the use of a portable USB device.
C.) A compromised private key has created a trust issue.

D.) The file copy process has been allow-listed. - answer✔✔A.) Data loss prevention prevents
file copying
An employee that carries a company credit card learns that the card has become compromised.
The employee only remembers fueling a company vehicle. Consider the following viable
methods and determine which method compromised the card.
Card cloning
Data blocker
Proximity reader

, EXAM STUDY MATERIALS 8/7/2024 11:29 AM

Card skimming - answer✔✔card skimming
Identify the type of attack where malware forces a legitimate process to load a malicious link
library.
A.) DLL injection
B.) Pass the Hash (PtH)
C.) Null pointer dereferencing

D.) Overflow attack - answer✔✔A.) DLL injection
What type of attack replays a cookie?
A.) Cross-site request forgery (CSRF or XSRF)
B.) Clickjacking
C.) Secure Sockets Layer (SSL) strip attack

D.) Session hijacking - answer✔✔D.) Session hijacking
After several users call to report dropped network connections on a local wireless network, a
security analyst scans network logs and discovers that multiple unauthorized devices were
connecting to the network and overwhelming it via a smartphone tethered to the network, which
provided a backdoor for unauthorized access. How would this device be classified?
A.) A switched port analyzer (SPAN)/mirror port
B.) A spectrum analyzer
C.) A rogue access point (AP)

D.) A thin wireless access point (WAP) - answer✔✔C.) A rouge access point (AP)
A hacker places a false name:IP address mapping in an operating system's HOSTS file,
redirecting traffic from a legitimate IP address to a malicious IP address. What type of attack did
the hacker perform?
A.) Domain hijacking
B.) Domain name system client cache (DNS) poisoning
C.) Rogue dynamic host configuration protocol (DHCP)

D.) Address Resolution Protocol (ARP) poisoning - answer✔✔B.) Domain name system client
cache (DNS) poisoning
IT staff reviews security alerts received for a monitoring system and discovers that uncommon
firewall ports on several Windows workstations and a server have been opened and are being
accessed by a malicious process. What does the staff determine the issue to be?

Geschreven voor

Instelling
SEC +
Vak
SEC +

Documentinformatie

Geüpload op
19 augustus 2024
Aantal pagina's
30
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Brightstars Havard School
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
218
Lid sinds
1 jaar
Aantal volgers
7
Documenten
12914
Laatst verkocht
18 uur geleden
VERIFIED EXAMS AND STUDY GUIDES.

Here, you will find Study Notes, Exam answer packs 100% Guarenteed success.

3.2

33 beoordelingen

5
10
4
4
3
8
2
3
1
8

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen