Certkiller44sure TestPrep Quiz 5

Skip to main content
CertKiller44Sure
Home
Dashboard
My courses

Quiz #5
Security+
TestPrep
Quiz #5
Status Finished
Started Thursday, 10 April 2025, 8:49 PM
Completed Thursday, 10 April 2025, 9:32 PM
Duration 42 mins 35 secs
Marks 32.50/44.00
Grade 73.86 out of 100.00

Question 1

Correct

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

Question 1

A.
Disaster recovery plan

B.
Incident response procedure

C.
Business continuity plan

D.
Change management procedure

Feedback

The correct answer is: Change management procedure

Question 2

Correct

An organization would like to store customer data on a separate part of the network that is not accessible to users on the main corporate network. Which of the following should the administrator use to accomplish this goal?

Question 2

A.
Segmentation

B.
Isolation

C.
Patching

D.
Encryption

Feedback

The correct answer is: Segmentation

Question 3

A company is expanding its threat surface program and allowing individuals to security test the company’s internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?

Question 3

A.
Open-source intelligence

B.
Bug bounty

C.
Red team

D.
Penetration testing

Feedback

The correct answer is: Bug bounty

Question 4

Correct

Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?

Question 4

A.
Insider

B.
Unskilled attacker

C.
Nation-state

D.
Hacktivist

Feedback

The correct answer is: Nation-state

Question 5

Correct

Which of the following enables the use of an input field to run commands that can view or manipulate data?

Question 5

A.
Cross-site scripting

B.
Side loading

C.
Buffer overflow

D.
SQL injection

Feedback

The correct answer is: SQL injection

Question 6

Correct

Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

Question 6

A.
Encrypted

B.
Intellectual property

C.
Critical

D.
Data in transit

Feedback

The correct answer is: Intellectual property

Question 7

Partially correct
Mark 0.50 out of 1.00
Remove flag

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Select TWO).

Question 7Select one or more:

A.
If a security incident occurs on the device, the correct employee can be notified.

B.
The security team will be able to send user awareness training to the appropriate device.

C.
Users can be mapped to their devices when configuring software MFA tokens.

D.
User-based firewall policies can be correctly targeted to the appropriate laptops.

E.
When conducting penetration testing, the security team will be able to target the desired laptops.

F.
Company data can be accounted for when the employee leaves the organization.

Feedback

The correct answers are: If a security incident occurs on the device, the correct employee can be notified., Company data can be accounted for when the employee leaves the organization.

Question 8

Correct

A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work. Which of the following is the best option?

Question 8

A.
Send out periodic security reminders.

B.
Update the content of new hire documentation.

C.
Modify the content of recurring training.

D.
Implement a phishing campaign

Feedback

The correct answer is: Modify the content of recurring training.

Question 9

A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems administrator use?

Question 9

A.
Packet captures

B.
Vulnerability scans

C.
Metadata

D.
Dashboard

Feedback

The correct answer is: Dashboard

Question 10

Correct

A systems administrator receives the following alert from a file integrity monitoring tool: The hash of the cmd.exe file has changed. The systems administrator checks the OS logs and notices that no patches were applied in the last two months. Which of the following most likely occurred?

Question 10

A.
The end user changed the file permissions.

B.
A cryptographic collision was detected.

C.
A snapshot of the file system was taken.

D.
A rootkit was deployed.

Feedback

The correct answer is: A rootkit was deployed.

Question 11

Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?

Question 11

A.
Client

B.
Third-party vendor

C.
Cloud provider

D.
DBA

Feedback

The correct answer is: Client

Question 12

Correct

A client asked a security company to provide a document outlining the project, the cost, and the completion time frame. Which of the following documents should the company provide to the client?

Question 12

A.
MSA

B.
SLA

C.
BPA

D.
SOW

Feedback

The correct answer is: SOW

Question 13

Correct

Which of the following is used to quantitatively measure the criticality of a vulnerability?

Question 13

A.
CVE

B.
CVSS

C.
CIA

D.
CERT

Feedback

The correct answer is: CVSS

Question 14

Correct

A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?

Question 14

A.
Secure cookies

B.
Version control

C.
Input validation

D.
Code signing

Feedback

The correct answer is: Input validation

Question 15

Remove flag

Which of the following must be considered when designing a high-availability network? (Select TWO).

Question 15Select one or more:

A.
Ease of recovery

B.
Ability to patch

C.
Physical isolation

D.
Responsiveness

E.
Attack surface

F.
Extensible authentication

Feedback

The correct answers are: Ease of recovery, Attack surface

Question 16

Correct

A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?

Question 16

A.
Air gap the system.

B.
Move the system to a different network segment.

C.
Create a change control request.

D.
Apply the patch to the system.

Feedback

The correct answer is: Create a change control request.

Question 17

Correct

Which of the following describes the reason root cause analysis should be conducted as part of incident response?

Question 17

A.
To gather loCs for the investigation

B.
To discover which systems have been affected

C.
To eradicate any trace of malware on the network

D.
To prevent future incidents of the same nature

Feedback

The correct answer is: To prevent future incidents of the same nature

Question 18

Correct

Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?

Question 18

A.
Fines

B.
Audit findings

C.
Sanctions

D.
Reputation damage

Feedback

The correct answer is: Fines

Question 19

Correct

A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?

Question 19

A.
Capacity planning

B.
Redundancy

C.
Geographic dispersion

D.
Tablet exercise

Feedback

The correct answer is: Capacity planning

Question 20

Correct

A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries. Which of the following is the most effective way to limit this access?

Question 20

A.
Data masking

B.
Encryption

C.
Geolocation policy

D.
Data sovereignty regulation

Feedback

The correct answer is: Geolocation policy

Question 21

Correct

Which of the following is a hardware-specific vulnerability?

Question 21

A.
Firmware version

B.
Buffer overflow

C.
SQL injection

D.
Cross-site scripting

Feedback

The correct answer is: Firmware version

Question 22

Correct

While troubleshooting a firewall configuration, a technician determines that a ”deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?

Question 22

A.
Documenting the new policy in a change request and submitting the request to change management

B.
Testing the policy in a non-production environment before enabling the policy in the production network

C.
Disabling any intrusion prevention signatures on the ‘deny any* policy prior to enabling the new policy

D.
Including an ‘allow any1 policy above the ‘deny any* policy

Feedback

The correct answer is: Testing the policy in a non-production environment before enabling the policy in the production network

Question 23

Correct

A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?

Question 23

A.
Testing input validation on the user input fields

B.
Performing code signing on company-developed software

C.
Performing static code analysis on the software

D.
Ensuring secure cookies are use

Feedback

The correct answer is: Performing code signing on company-developed software

Question 24

Correct

A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?

Question 24

A.
Default credentials

B.
Non-segmented network

C.
Supply chain vendor

D.
Vulnerable software

Feedback

The correct answer is: Supply chain vendor

Question 25

Correct

Which of the following can be used to identify potential attacker activities without affecting production servers?

Question 25

A.
Honey pot

B.
Video surveillance

C.
Zero Trust

D.
Geofencing

Feedback

The correct answer is: Honey pot

Question 26

During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?

Question 26

A.
Analysis

B.
Lessons learned

C.
Detection

D.
Containment

Feedback

The correct answer is: Analysis

Question 27

A security practitioner completes a vulnerability assessment on a company’s network and finds several vulnerabilities, which the operations team remediates. Which of the following should be done next?

Question 27

A.
Conduct an audit.

B.
Initiate a penetration test.

C.
Rescan the network.

D.
Submit a report.

Feedback

The correct answer is: Rescan the network.

Question 28

Correct

An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device. Which of the following best describes the user’s activity?

Question 28

A.
Penetration testing

B.
Phishing campaign

C.
External audit

D.
Insider threat

Feedback

The correct answer is: Insider threat

Question 29

Which of the following allows for the attribution of messages to individuals?

Question 29

A.
Adaptive identity

B.
Non-repudiation

C.
Authentication

D.
Access logs

Feedback

The correct answer is: Non-repudiation

Question 30

Correct

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

Question 30

A.
Automation

B.
Compliance checklist

C.
Attestation

D.
Manual audit

Feedback

The correct answer is: Automation

Question 31

Correct

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

Question 31

A.
SCAP

B.
Net Flow

C.
Antivirus

D.
DLP

Feedback

The correct answer is: DLP

Question 32

An organization recently updated its security policy to include the following statement: Regular expressions are included in source code to remove special characters such as $, |, ;. &, `, and ? from variables set by forms in a web application. Which of the following best explains the security technique the organization adopted by making this addition to the policy?

Question 32

A.
Identify embedded keys

B.
Code debugging

C.
Input validation

D.
Static code analysis

Feedback

The correct answer is: Input validation

Question 33

A security analyst and the management team are reviewing the organizational performance of a recent phishing campaign. The user click-through rate exceeded the acceptable risk threshold, and the management team wants to reduce the impact when a user clicks on a link in a phishing message. Which of the following should the analyst do?

Question 33

A.
Place posters around the office to raise awareness of common phishing activities.

B.
Implement email security filters to prevent phishing emails from being delivered

C.
Update the EDR policies to block automatic execution of downloaded programs.

D.
Create additional training for users to recognize the signs of phishing attempts.

Feedback

The correct answer is: Update the EDR policies to block automatic execution of downloaded programs.

Question 34

Correct

A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks. Which of the following analysis elements did the company most likely use in making this decision?

Question 34

A.
IMTTR

B.
RTO

C.
ARO

D.
MTBF

Feedback

The correct answer is: ARO

Question 35

Correct

Which of the following security concepts is the best reason for permissions on a human resources fileshare to follow the principle of least privilege?

Question 35

A.
Integrity

B.
Availability

C.
Confidentiality

D.
Non-repudiation

Feedback

The correct answer is: Confidentiality

Question 36

Correct

Which of the following is the most likely to be included as an element of communication in a security awareness program?

Question 36

A.
Reporting phishing attempts or other suspicious activities

B.
Detecting insider threats using anomalous behavior recognition

C.
Verifying information when modifying wire transfer data

D.
Performing social engineering as part of third-party penetration testing

Feedback

The correct answer is: Reporting phishing attempts or other suspicious activities

Question 37

Correct

After a recent ransomware attack on a company’s system, an administrator reviewed the log files. Which of the following control types did the administrator use?

Question 37

A.
Compensating

B.
Detective

C.
Preventive

D.
Corrective

Feedback

The correct answer is: Detective

Question 38

Correct

Which of the following agreement types defines the time frame in which a vendor needs to respond?

Question 38

A.
SOW

B.
SLA

C.
MOA

D.
MOU

Feedback

The correct answer is: SLA

Question 39

A Chief Information Security Officer wants to monitor the company’s servers for SQLi attacks and allow for comprehensive investigations if an attack occurs. The company uses SSL decryption to allow traffic monitoring. Which of the following strategies would best accomplish this goal?

Question 39

A.
Logging all NetFlow traffic into a SIEM

B.
Deploying network traffic sensors on the same subnet as the servers

C.
Logging endpoint and OS-specific security logs

D.
Enabling full packet capture for traffic entering and exiting the servers

Feedback

The correct answer is: Enabling full packet capture for traffic entering and exiting the servers

Question 40

A company is developing a critical system for the government and storing project information on a fileshare. Which of the following describes how this data will most likely be classified? (Select TWO).

A. Private

B. Confidential

C. Public

D. Operational

E. Urgent

F. Restricted

Feedback

The correct answers are: Confidential, Restricted

Question 41

After reviewing the following vulnerability scanning report:

Server:192.168.14.6
Service: Telnet
Port: 23
Protocol: TCP
Status: Open
Severity: High
Vulnerability: Use of an insecure network protocol

A security analyst performs the following test:

nmap -p 23 192.168.14.6 —script telnet-encryption

PORT STATE SERVICE REASON
23/tcp open telnet syn-ack
I telnet encryption:
| _ Telnet server supports ==encryption==

Which of the following would the security analyst conclude for this reported vulnerability?

A. It is a false positive

B. A rescan is required.

C. It is considered noise.

D. Compensating controls exist.

Feedback

The correct answer is: It is a false positive

Question 42

A security consultant needs secure, remote access to a client environment. Which of the following should the security consultant most likely use to gain access?

A. EAP

B. DHCP

C. IPSec

D. NAT

Feedback

The correct answer is: IPSec

Question 43

Which of the following best practices gives administrators a ==set period to perform changes to an operational system== to ensure availability and minimize business impacts?

A. Impact analysis

B. Scheduled downtime

C. Backout plan

D. Change management boards

Feedback

The correct answer is: Scheduled downtime

Question 44

Which of the following actions could a security engineer take to ensure workstations and servers are properly ==monitored for unauthorized changes== and software?

A. Configure all systems to log scheduled tasks.

B. Collect and monitor all traffic exiting the network.

C. Block traffic based on known malicious signatures.

D. Install endpoint management software on all systems.

Feedback

The correct answer is: Install endpoint management software on all systems.