Skip survey header

Security+ Practice Quiz: SY0-601 Quiz 12

Enjoy the following 10 question quiz from TestOut.

1. Which of the following is a program that appears to be a legitimate application, utility, game, or screensaver, but performs malicious activities surreptitiously?
2. In 2001, a worm exploited vulnerabilities in Microsoft Internet Information Services (IIS) to infect over 250,000 systems in under nine hours. What was this worm called?
3. You want to create a collection of computers on your network that appear to have valuable data but actually store fake data that could entice a potential intruder. Once the intruder connects, you want to be able to observe and gather information about the attacker's methods.

Which feature should you implement?

4. Which of the following methods did Microsoft introduce in Windows 10 to help distribute OS updates?

5. What is the main function of a TPM hardware chip?
6. When two different messages produce the same hash value, what has occurred?
7. SQL injections are a result of which of the following flaws?
8. Which application development model approaches software development as a continuous, changing process with never-ending versions, bug fixes, and enhancements?
9. You are performing a security test from the outside on a new application that has been deployed. Which secure testing method are you MOST likely using?
10. Which of the following is the primary purpose of change control?
This free quiz was provided by: