Skip survey header

Security+ Practice Quiz: SY0-601 Quiz 3

Enjoy the following 10 question quiz from TestOut.

1. Your computer system is a participant in an asymmetric cryptography system. You've created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user.

In this example, which protection does the hashing activity provide?
2. Which of the following is an example of an internal threat?
3. You provide internet access for a local school. You want to control internet access based on the user and prevent access to specific URLs. Which type of firewall should you install?

4. Jessica needs to set up a firewall to protect her internal network from the internet. Which of the following would be the BEST type of firewall for her to use?

5. Which of the following can be classified as a stream cipher?
6. Which type of password attack employs a list of predefined passwords that it tries against a login prompt?
7. In which phase of the Microsoft Intune application life cycle would you assign an app to users and/or devices you manage and monitor them on the Azure portal?
8. Which of the following app deployment and update methods allows updates to be uploaded onto Intune where they can be pushed out to users within 24 hours?
9. You would like to make sure users are not accessing inappropriate content online at work. Which endpoint security strategy would you employ?
10. You want to allow RDP 3389 traffic into your network for a group of users to access a particular workstation that has a special application in your office. Which endpoint security tool would you use to make this happen?
This free quiz was provided by: