SEC+

  1.  
    A user, Ann, is reporting to the company IT support group that her workstation screen is blank other than a window with a message requesting payment or else her hard drive will be formatted. Which of the following types of malware is on Ann's workstatio
    A. Ransomware B. Trojan C. Spyware D. Adware
  2.  
    Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?
    A. Interference B. Rogue access point C. Man-in-the-middle D. ARP poisoning
  3.  
    After a user performed a war driving attack, the network administrator noticed several similar markings where WiFi was available throughout the enterprise. Which of the following is the term used to describe these markings?
    A. IV attack B. War dialing C. War chalking D. Rogue access points
  4.  
    When systems, hardware, or software are not supported by the original vendor, it is known as?
  5.  
    Bob, a user, wants to send Sally, another user, a confidential document electronically via email. What should should Bob do to ensure the document is protected from eavesdropping?
  6.  
    An auditor has identified an access control system that displays errors when it incorrectly accepts access attempts from unauthorized users. Which of the following authentication systems has the auditor reviewed?
    A. Biometric B. TACACS+ C. RADIUS D. Certificate Pinning
  7.  
    A hacker group launched a malware attack against users that clicked an email link that led to a website that infected their workstation with malware. This allowed the hackers to steal the user's personal data. The malware was not detected or blocked by
Answer Key
Hide Answer Key

SEC+ (Answer Key)

  1.  
    A user, Ann, is reporting to the company IT support group that her workstation screen is blank other than a window with a message requesting payment or else her hard drive will be formatted. Which of the following types of malware is on Ann's workstatio
    A. Ransomware B. Trojan C. Spyware D. Adware
  2.  
    Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?
    A. Interference B. Rogue access point C. Man-in-the-middle D. ARP poisoning
  3.  
    After a user performed a war driving attack, the network administrator noticed several similar markings where WiFi was available throughout the enterprise. Which of the following is the term used to describe these markings?
    A. IV attack B. War dialing C. War chalking D. Rogue access points
  4.  
    When systems, hardware, or software are not supported by the original vendor, it is known as?
    end-of-life systems
  5.  
    Bob, a user, wants to send Sally, another user, a confidential document electronically via email. What should should Bob do to ensure the document is protected from eavesdropping?
    Encrypt the message with Sally's public email certificate
  6.  
    An auditor has identified an access control system that displays errors when it incorrectly accepts access attempts from unauthorized users. Which of the following authentication systems has the auditor reviewed?
    A. Biometric B. TACACS+ C. RADIUS D. Certificate Pinning
  7.  
    A hacker group launched a malware attack against users that clicked an email link that led to a website that infected their workstation with malware. This allowed the hackers to steal the user's personal data. The malware was not detected or blocked by
    Zero-Day Attack

Quick Feedback for Knowledge Mouse

Want to suggest a feature? Report a problem? Suggest a correction? Please let Knowledge Mouse know below: