Skip survey header

Security+ Practice Quiz: SY0-701 Quiz 2

Enjoy the following 10 question quiz from TestOut.

1. Which of the following security challenges refers to the rapid and broad spread of an attack, often affecting a large number of computers in a relatively short amount of time?
2. Which of the following is a method of implementing security controls?
3. A private key has been stolen. Which action should you take to deal with this crisis?

4. You are concerned that if a private key is lost, all documents encrypted with your private key will be inaccessible. Which service should you use to solve this problem?

5. Which of the following switch attacks associates the attacker's MAC address with the IP address of the victim's devices?
6. Which of the following attacks, if successful, causes a switch to function like a hub?
7. You are worried about email spoofing. What can be put throughout an email's header that provides the originating email account or IP address, and not a spoofed one?
8. What is the MOST important element related to evidence in addition to the evidence itself?
9. Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called?
10. A new company implements a data center that will hold proprietary data that is output from a daily workflow. As the company has not received any funding, no risk controls are in place.

How does the company approach risk during operations?
This free quiz was provided by: