Skip survey header

Security+ Practice Quiz: SY0-601 Quiz 15

Enjoy the following 10 question quiz from TestOut.

1. A type of malware that prevents the system from being used until the victim pays the attacker money is known as which of the following?
2. Ron, a hacker, wants to get access to a prestigious law firm he has been watching for a while. June, an administrative assistant at the law firm, is having lunch at the food court around the corner from her office. Ron notices that June has a picture of a dog on her phone. He casually walks by and starts a conversation about dogs.

Which phase of the social engineering process is Ron in?
3. Which of the following should be configured on the router to filter traffic at the router level?

4. Which type of ACL should be placed as close to the source as possible?

5. A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender.

Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission?
6. Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message?
7. A programmer that fails to check the length of input before processing leaves his code vulnerable to which form of common attack?
8. Sam has used malware to access Sally's computer on the network. He has found information that allows him to use the underlying NTLM to escalate his privileges without needing the plaintext password.

Which of the following types of attacks did he use?
9. You have been asked to deploy a network solution that includes an alternate location where operational recovery is provided within minutes of a disaster. Which of the following strategies would you choose?
10. What is the primary security feature that can be designed into a network's infrastructure to protect and support availability?
This free quiz was provided by: