Skip survey header

Security+ Practice Quiz: SY0-701 Quiz 1

Enjoy the following 10 question quiz from TestOut.

1. A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security risks is MOST pressing?
2. Your computer system is a participant in an asymmetric cryptography system. You've created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user.

In this example, which protection does the hashing activity provide?
3. Which of the following is the term for the process of validating a subject's identity?

4. What principle of an organization's information security system ensures that only authorized individuals can access sensitive data, the data remains unaltered during storage and transfer, and the data is always accessible when needed?

5. Which of the following scenarios would typically utilize 802.1x authentication?
6. You want to increase the security of your network by allowing only authenticated users to access network devices through a switch. Which of the following should you implement?
7. By definition, what is the process of reducing security exposure and tightening security controls?
8. As a system administrator, you are tasked with hardening the system in your organization. Which of the following strategies is MOST effective in reducing the impact if a single system is compromised?
9. A cybersecurity team is conducting a risk assessment of a company's IT infrastructure. The team identified a potential vulnerability that could result in the loss of a critical system.

They determined if the team does not remediate the issue, they would lose approximately 40 percent of the system's data. What is this percentage representative of in this scenario?
10. When analyzing assets, which analysis method assigns financial values to assets?
This free quiz was provided by: