Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
Security+ Practice Test 7
Home
Security+ Practice Test 7
Start your Security+ Practice Test 7
Which of the following example depicts a transitive trust?
A. Domain A trusts Domain B, Domain B trusts Domain C, Domain A trusts Domain C
B. Domain A trusts Domain B, Domain C trusts Domain A, Domain C trusts Domain B
C. Domain A trusts Domain B, Domain B trusts Domain C, Domain C trusts Domain A
D. Domain A trusts Domain B, Domain B trusts Domain A
None
While collecting evidence for digital forensics, which of the following is the volatile evidence that must be given first priority?
A. Recovering data from the network logs
B. Recovering data from the Compact Disc
C. Recovering data from backups
D. Recovering videos from Closed Circuit Television
None
Your organization had all public E-mail Websites blocked. However, with the implementation of Office 365, the users are now able to access Hotmail and Outlook.com Web sites. Users are also able to access their personal OneDrive, which was also blocked earlier. You want to prevent users from sharing data through their personal E-mail accounts or through OneDrive. You must protect data leaks that can possibly occur through them. What should you do?
A. Encrypt corporate data
B. Use Content Filtering
C. Implement Data Loss Prevention (DLP)
D. Use the Principle of Least Privilege
None
You need to ensure that the IP traffic is encapsulated when it is sent outside of your local network. The traffic will be sent using WAN links and received by other networks at the partner organizations. Which of the following should be implemented to meet the requirements?
A. Transport Mode
B. Tunnel Mode
C. Both 1 & 2
D. Neither 1 nor 2
None
You have implemented a DLP solution on your network. A user attempts to send an E-mail with sensitive information to a personal E-mail account. What is likely to be the outcome of this action?
A. The e-mail will be forwarded to the administrator.
B. The e-mail will be stored in quarantine until it is authorized to be sent.
C. The e-mail will be blocked, and the user is likely to be informed.
D. The e-mail will be sent, and an alert will be sent in parallel to the administrator.
None
Which of the following is the typical main motive of an organized cybercriminal?
A. Political
B. Social
C. Policy
D. Profit
None
Which of the following can be the outcome of a buffer overflow attack? [Choose all that apply.]
A. Corrupted adjacent memory space
B. Possible cyberattack
C. Disruption of services
D. System crash
E. Intercepted and modified data packets
You have implemented the Online Certificate Status Protocol (OSCP) with a certificate authority. Which of the following attack is likely to occur with this implementation?
A. Integrity
B. Privacy
C. Confidentiality
D. Availability
None
A sales executive logs on to the company’s website. There is a message on the website stating that this is the new website of the company, and all users need to register again. The executive registers on the website by filling in the personal details and accesses all the customer details for reporting purposes. After a few days, the executive gets a mail from the management informing the executive about the theft of all customer details. Which attack was the sales executive subjected to?
A. Session hijacking
B. Domain name kiting
C. Domain hijacking
D. TCP/IP hijacking
None
You have a database server that requires an open port to execute queries from the Web server. The enterprise firewall has this port open to let the queries pass through to the database server. An attacker has taken advantage of the open port and attacked the database using brute force techniques. Which of the following options below has caused the attacker to gain access?
A. Misconfigured Webserver
B. Unsecured database server
C. Misconfigured firewall
D. Privilege Escalation
None
Time's up