Skip survey header

Security+ Practice Quiz: SY0-601 Quiz 7

Enjoy the following 10 question quiz from TestOut.

1. Which of the following is one of the MOST common attacks on employees?
2. A hacker scans hundreds of IP addresses randomly on the internet until they find an exploitable target. What kind of attack is this?
3. You are the security analyst for your organization and have recently noticed a large amount of spim on the company mobile devices. Employees rely on the IM app to communicate with each other.

Which of the following countermeasures should you implement?

4. You have implemented a new application control solution. After monitoring traffic and use for a while, you have noticed an application that continuously circumvents blocking.

How should you configure the application control software to handle this application?

5. A birthday attack focuses on which of the following?
6. An attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or she has. Which type of attack is the attacker using?
7. Which step in the penetration testing life cycle is accomplished using rootkits or Trojan horse programs?
8. Which of the following uses hacking techniques to proactively discover internal vulnerabilities?
9. You have been asked to implement a RAID 5 solution for your network. What is the minimum number of hard disks that can be used to configure RAID 5?
10. Which backup strategy backs up all files from a computer's file system, regardless of whether the file's archive bit is set or not, and then marks them as backed up?
This free quiz was provided by: