Skip survey header

Security+ Practice Quiz: SY0-601 Quiz 18

Enjoy the following 10 question quiz from TestOut.

1. Brandon is helping Fred with his computer. He needs Fred to enter his username and password into the system. Fred enters the username and password while Brandon is watching him. Brandon explains to Fred that it is not a good idea to allow anyone to watch you type in usernames or passwords.

Which type of social engineering attack is Fred referring to?
2. Compliments, misinformation, feigning ignorance, and being a good listener are tactics of which social engineering technique?
3. Which of the following attacks, if successful, causes a switch to function like a hub?

4. Which protocol should you disable on the user access ports of a switch?

5. A PKI is an implementation for managing which type of encryption?
6. In the certificate authority trust model known as a hierarchy, where does trust start?
7. Your organization is having a third party come in and perform an audit on the financial records. You want to ensure that the auditor has access to the data they need while keeping the customers' data secure. To accomplish this goal, you plan to implement a mask that replaces the client names and account numbers with fictional data.

Which masking method are you implementing?
8. You have been offered a position as a security analyst for Acme, Inc. The position will be remote. Acme Inc. has sent you your employment contract using a system that only allows you to open and digitally sign the contract.

Which rights management method is being used?
9. You would like to simulate an attack on your network so you can test defense equipment and discover vulnerabilities in order to mitigate risk. Which tool would you use to simulate all the packets of an attack?
10. Daily backups are completed at the ABD company location, and only a weekly backup is maintained at another network location. Which of the following disaster recovery strategies is ABD using?
This free quiz was provided by: