Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
Security+ Practice Test 8
Home
Security+ Practice Test 8
Start your Security+ Practice Test 8
Which of the following impact the calculations of quantitative risk assessment? [Choose all that apply.]
A. Probability of threat
B. Annual Loss Expectancy
C. Single Loss Expectancy
D. Business Impact Analysis
E. Annualized Rate of Occurrence
You have recently installed several CCTV cameras with motion detection capabilities. Which type of security control have you implemented?
A. Deterrent
B. Recovery
C. Corrective
D. Detective
E. Compensating
None
If you configure Context-aware authentication through Mobile Device Management (MDM), which of the following can be considered as context?
A. MAC address of the destination device
B. Username
C. Resources being accessed
D. Time of the day
E. Location of the mobile device
F. All of the mentioned choices
None
Which of the following option distinguishes intrusive scanning from non-intrusive scanning?
A. Crash the remote target
B. Identify listening ports
C. Discover vulnerabilities
D. Perform security checks
None
Which of the following test identifies weaknesses while ensuring that normal operations are not affected by this testing?
A. Black box test
B. Gray box test
C. Vulnerability scan
D. White box test
None
Which of the following should you conduct when evaluating your hardware and software vendors?
A. Scale the operation
B. Background check
C. Supply chain assessment
D. Risk assessment
None
Which of the following statements about the testing environment is true?
A. It is deployed within the organization’s DMZ.
B. It is isolated from the development environment
C. It is used to test all the installation, configuration, and migration scripts and procedures.
D. It is the live environment that runs the application.
None
A Web developer has developed a Web application that needs to be debugged. The Web developer needs to capture and find vulnerabilities. The developer also wants to change the requests and responses as they are captured. What should the developer do?
A. Configure an interception proxy
B. Install and configure a Host Intrusion Detection System on the Web server
C. Log all the traffic on the firewall
D. Review the Web server logs
None
You have developed a secret formula for a medicine. What does the secret formula classify to be?
A. Public
B. Confidential
C. Proprietary
D. Private
None
You want to identify risks associated with authorization to your organization network. Which of the following testing mechanism would help you achieve the same?
A. Portability testing
B. Stress testing
C. Vulnerability testing
D. Performance testing
None
Time's up