Skip survey header

Security+ Practice Quiz: SY0-601 Quiz 4

Enjoy the following 10 question quiz from TestOut.

1. Which of the following BEST describes a cyber terrorist?
2. Which of the following is the correct definition of a threat?
3. If Mark has a read-write permission to the share \fileserversecurefiles and a read-only permission to the file coolstuff.docx on the NTFS file system shared by the file share, he is able to perform which action?

4. What does the netstat -a command show?

5. You are teaching new users about security and passwords. Which of the following is the BEST example of a secure password?
6. Which of the following utilities could you use to lock a user account? (Choose two)
7. Which of the following BEST describes the Physical SDN layer?
8. A group of small local businesses have joined together to share access to a cloud-based payment system. Which type of cloud is MOST likely being implemented?
9. Which of the following techniques involves adding random bits of data to a password before it is stored as a hash?
10. What is the purpose of audit trails?
This free quiz was provided by: