Skip survey header

Security+ Practice Quiz: SY0-601 Quiz 25

Enjoy the following 10 question quiz from TestOut.

1. Jason is at home, attempting to access the website for his music store. When he goes to the website, it has a simple form asking for a name, email, and phone number. This is not the music store website. Jason is sure the website has been hacked.

How did the attacker accomplish this hack?
2. A wireless access point configured to use Wired Equivalent Privacy (WEP) is an example of which kind of vulnerability?
3. A group of salesmen would like to remotely access your private network through the internet while they are traveling. You want to control access to the private network through a single server.

Which solution should you implement?

4. Which VPN protocol typically employs IPsec as its data encryption mechanism?

5. Which of the following commands is used to change the current group ID during a login session?
6. You are attempting to delete the temp group but are unable to. Which of the following is the MOST likely cause?
7. DLP can be used to identify sensitive files in a file system and then embed the organization's security policy within the file. Which of the following DLP implementations travels with sensitive data files when they are moved or copied?
8. Which of the following is specifically meant to ensure that a program operates on clean, correct, and useful data?
9. When you inform an employee that he or she is being terminated, which of the following is the most important activity?
10. How often should change-control management be implemented?
This free quiz was provided by: