Security Fundamentals Professional Certification
Practice Test
A user has both a password and a PIN-code. They can use either one on its own to
login. What type of authentication is this?
a. Two-factor authentication
b. Multi-factor authentication
c. Single-factor authentication
d. Memory-factor authentication - ------------ANS: c. Single-factor authentication
An allowlist policy lists an app named app1, which only requires standard user
privileges to run, along with the path to the app1.exe file. What occurs when a user
attempts to run app1 on a Windows machine?
a. The application runs
b. The result depends on the operating system
c. The outcome depends on the user's privilege
d. The application is blocked from running - ------------ANS: a. The application runs
As the number of devices connecting to your network grows, what would you apply
at the network level to minimize the attack surface?
a. Block or disable unused ports.
b. Set up a honeynet.
c. Set up Simple Network Management Protocol (SNMP) traps.
d. Enable auditing. - ------------ANS: a. Block or disable unused ports.
How would you mitigate cross-site scripting (XSS) attacks?
a. Use Transparent Data Encryption (TDE)
, b. Scan for Personally Identifiable Information (PII)
c. Implement client-side and/or server-side input sanitization
d. Disable unused, well-known ports - ------------ANS: c. Implement client-side and/or
server-side input sanitization
Malware propagates throughout the network without user interaction. What type of
malware best fits the description?
a. Adware
b. A virus
c. Ransomware
d. A worm - ------------ANS: d. A worm
The industry your organization is active in is targeted by an advanced persistent
threat (APT) group that uses a command-and-control server. The APT attacks a
partner organization. What information would you ask the organization to provide you
with that could be a good indicator of compromise (IoC) to enable you to discover a
possible attack by the same APT group?
a. The external IP address of the compromised organization
b. The IP address of the command-and-control server
c. The name of the accounts that were compromised
d. The operating system of the command-and-control server - ------------ANS: b. The
IP address of the command-and-control server
What must you calculate to determine risk after completing a vulnerability and threat
assessment?
a. The effect on critical infrastructure
b. The type of company - public or private
c. The likelihood of occurrence
Practice Test
A user has both a password and a PIN-code. They can use either one on its own to
login. What type of authentication is this?
a. Two-factor authentication
b. Multi-factor authentication
c. Single-factor authentication
d. Memory-factor authentication - ------------ANS: c. Single-factor authentication
An allowlist policy lists an app named app1, which only requires standard user
privileges to run, along with the path to the app1.exe file. What occurs when a user
attempts to run app1 on a Windows machine?
a. The application runs
b. The result depends on the operating system
c. The outcome depends on the user's privilege
d. The application is blocked from running - ------------ANS: a. The application runs
As the number of devices connecting to your network grows, what would you apply
at the network level to minimize the attack surface?
a. Block or disable unused ports.
b. Set up a honeynet.
c. Set up Simple Network Management Protocol (SNMP) traps.
d. Enable auditing. - ------------ANS: a. Block or disable unused ports.
How would you mitigate cross-site scripting (XSS) attacks?
a. Use Transparent Data Encryption (TDE)
, b. Scan for Personally Identifiable Information (PII)
c. Implement client-side and/or server-side input sanitization
d. Disable unused, well-known ports - ------------ANS: c. Implement client-side and/or
server-side input sanitization
Malware propagates throughout the network without user interaction. What type of
malware best fits the description?
a. Adware
b. A virus
c. Ransomware
d. A worm - ------------ANS: d. A worm
The industry your organization is active in is targeted by an advanced persistent
threat (APT) group that uses a command-and-control server. The APT attacks a
partner organization. What information would you ask the organization to provide you
with that could be a good indicator of compromise (IoC) to enable you to discover a
possible attack by the same APT group?
a. The external IP address of the compromised organization
b. The IP address of the command-and-control server
c. The name of the accounts that were compromised
d. The operating system of the command-and-control server - ------------ANS: b. The
IP address of the command-and-control server
What must you calculate to determine risk after completing a vulnerability and threat
assessment?
a. The effect on critical infrastructure
b. The type of company - public or private
c. The likelihood of occurrence