Skip survey header

Security+ Practice Quiz: SY0-601 Quiz 10

Enjoy the following 10 question quiz from TestOut.

1. A collection of zombie computers have been set up to collect personal information. Which type of malware do the zombie computers represent?
2. Which kind of virus operates only in memory and usually exploits a trusted application like PowerShell to circumvent traditional endpoint security solutions?
3. Travis and Craig are both standard users on the network. Each user has a folder on the network server that only they can access. Recently, Travis has been able to access Craig's folder.

This situation indicates which of the following has occurred?

4. Which type of application allows users to share and access content without using a centralized server?

5. Which utility would you MOST likely use on OS X to encrypt and decrypt data and messages?
6. You have transferred an encrypted file across a network using the Server Message Block (SMB) Protocol. What happens to the file's encryption?
7. Which of the following protocols uses port 443?
8. Which TCP/IP protocol is a secure form of HTTP that uses SSL as a sub-layer for security?
9. When you conduct a forensic investigation, which of the following initial actions is appropriate for preserving evidence?
10. You have detected and identified a security event. What's the first step you should complete?
This free quiz was provided by: