Skip survey header

Security+ Practice Quiz: SY0-601 Quiz 13

Enjoy the following 10 question quiz from TestOut.

1. Which of the following threat actors seeks to defame, shed light on, or cripple an organization or government?
2. In which phase of an attack does the attacker gather information about the target?
3. Which of the following describes a logic bomb?

4. Which VPN implementation uses routers on the edge of each site?

5. Which of the following algorithms are used in symmetric encryption? (Choose two)
6. If a message sender encrypts a message with a key and a message receiver decrypts it using the same key, which type of key exchange is taking place?
7. What is the most common form of host-based IDS that employs signature or pattern-matching detection methods?
8. Which security mechanism can be used to detect attacks that originate on the internet or from within an internal trusted subnet?
9. When analyzing assets, which analysis method assigns financial values to assets?
10. You have conducted a risk analysis to protect a key company asset. You identify the following values:

Asset value = 400
Exposure factor = 75
Annualized rate of occurrence = .25

What is the single loss expectancy (SLE)?
This free quiz was provided by: