0%
Created by agyenbons

Sec+ Practice Domain1

1 / 25

Category: Sec+ Domain 1

213.      Carolyn runs a vulnerability scan of a network device and discovers that the device is running services on TCP ports 22 and 443. What services has she most likely discovered?

2 / 25

Category: Sec+ Domain 1

207.      There are seven impact categories that you need to know for the Security+ exam. Which of the following is not one of them?

3 / 25

Category: Sec+ Domain 1

204.      What is the root cause of improper input handling?

4 / 25

Category: Sec+ Domain 1

195.      If Frank were still operating in his on-site infrastructure, which of the following technologies would provide the most insight into what type of attack he was seeing?

5 / 25

Category: Sec+ Domain 1

189.      During what phase of a penetration test is information like employee names, phone number, and email addresses gathered?

6 / 25

Category: Sec+ Domain 1

175.      Frank is part of a white team for a cybersecurity exercise. What role will he and his team have?

7 / 25

Category: Sec+ Domain 1

174.      Madhuri is concerned about the security of the machine learning algorithms that her organi- zation is deploying. Which of the following options is not a common security precaution for machine learning algorithms?

8 / 25

Category: Sec+ Domain 1

163.      Patrick has subscribed to a commercial threat intelligence feed that is only provided to sub- scribers who have been vetted and who pay a monthly fee. What industry term is used to refer to this type of threat intelligence?

9 / 25

Category: Sec+ Domain 1

124.      Under which type of attack does an attacker’s system appear to be the server to the real client and appear to be the client to the real server?

10 / 25

Category: Sec+ Domain 1

120.      Which of the following attacks can be caused by a user being unaware of their physical surroundings?

11 / 25

Category: Sec+ Domain 1

100.     What best describes an attack that attaches some malware to a legitimate program so that when the user installs the legitimate program, they inadvertently install the malware?

12 / 25

Category: Sec+ Domain 1

98.          You have discovered that there are entries in your network’s domain name server that point legitimate domains to unknown and potentially harmful IP addresses. What best describes this type of attack?

13 / 25

Category: Sec+ Domain 1

90.      What two techniques are most commonly associated with a pharming attack?

14 / 25

Category: Sec+ Domain 1

89.      Daryl is investigating a recent breach of his company’s web server. The attacker used sophis- ticated techniques and then defaced the website, leaving messages that were denouncing the company’s public policies. He and his team are trying to determine the type of actor who most likely committed the breach. Based on the information provided, who was the most likely threat actor?

15 / 25

Category: Sec+ Domain 1

85.      Elizabeth is investigating a network breach at her company. She discovers a program that was able to execute code within the address space of another process by using the target pro- cess to load a specific library. What best describes this attack?

16 / 25

Category: Sec+ Domain 1

74.      Which of the following best describes malware that will execute some malicious activity when a particular condition is met (i.e., if the condition is met, then executed)?

17 / 25

Category: Sec+ Domain 1

67.      Mary has discovered that a web application used by her company does not always handle multithreading properly, particularly when multiple threads access the same variable. This could allow an attacker who discovered this vulnerability to exploit it and crash the server. What type of error has Mary discovered?

18 / 25

Category: Sec+ Domain 1

64.      You are performing a penetration test of your company’s network. As part of the test, you will be given a login with minimal access and will attempt to gain administrative access with this account. What is this called?

19 / 25

Category: Sec+ Domain 1

39.      A sales manager at your company is complaining about slow performance on his computer. When you thoroughly investigate the issue, you find spyware on his computer. He insists that the only thing he has downloaded recently was a freeware stock trading application. What would best explain this situation?

20 / 25

Category: Sec+ Domain 1

34.      While investigating a malware outbreak on your company network, you discover something very odd. There is a file that has the same name as a Windows system DLL, and it even has the same API interface, but it handles input very differently, in a manner to help compromise the system, and it appears that applications have been attaching to this file, rather than the real system DLL. What best describes this?

21 / 25

Category: Sec+ Domain 1

25.      Mahmoud is responsible for managing security at a large university. He has just performed a threat analysis for the network, and based on past incidents and studies of similar networks, he has determined that the most prevalent threat to his network is low-skilled attackers who wish to breach the system, simply to prove they can or for some low-level crime, such as changing a grade. Which term best describes this type of attacker?

22 / 25

Category: Sec+ Domain 1

24.      The organization that Mike works in finds that one of their domains is directing traffic to a competitor’s website. When Mike checks, the domain information has been changed, including the contact and other administrative details for the domain. If the domain had not expired, what has most likely occurred?

23 / 25

Category: Sec+ Domain 1

21.      Susan wants to reduce the likelihood of successful credential harvesting attacks via her orga- nization’s commercial websites. Which of the following is not a common prevention method aimed at stopping credential harvesting?

24 / 25

Category: Sec+ Domain 1

12.      Unusual outbound network traffic, geographical irregularities, and increases in database read volumes are all examples of what key element of threat intelligence?

25 / 25

Category: Sec+ Domain 1

11.      Teresa is the security manager for a mid-sized insurance company. She receives a call from law enforcement, telling her that some computers on her network participated in a massive denial-of-service (DoS) attack. Teresa is certain that none of the employees at her company would be involved in a cybercrime. What would best explain this scenario?

Leave a Comment

Your email address will not be published. Required fields are marked *