Skip survey header

Security+ Practice Quiz: SY0-601 Quiz 5

Enjoy the following 10 question quiz from TestOut.

1. Which of the following is an example of a vulnerability?
2. Which of the following items would be implemented at the Data layer of the security model?
3. The IT manager has asked you to create four new VLANs for a new department. As you are going through the VLAN configurations, you find some VLANs numbered 1002-1005. However, they are not in use.

What should you do with these VLANs?

4. A virtual LAN can be created using which of the following?

5. Which of the following encryption mechanisms offers the least security because of weak keys?
6. You have downloaded a file from the internet. You generate a hash and check it against the original file's hash to ensure the file has not been changed. Which information security goal is this an example of?
7. Which of the following is a secure alternative to FTP that uses SSL for encryption?
8. Which of the following protocols can be used to securely manage a network device from a remote connection?
9. You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled?
10. What is the best definition of a security incident?
This free quiz was provided by: