Security+ 601 Practice Test 4
Security+ 601 Practice Test 4
Security+ 601 Practice Test 4
Dion Training is concerned with the possibility of employees accessing another user's
workstation in secured areas without their permission. Which of the following would BEST
be able to prevent this from happening?
During her login session, Sally is asked by the system for a code sent to her via text (SMS)
message. Which of the following concerns should she raise to her organization’s AAA
services manager?
Dion Training has recently opened an Internet café for students to use during their lunch
break. Unfortunately, Dion Training doesn’t have any wireless networks in their building,
so they have placed three laptops in the Internet café. What protection should be installed
to best prevent the laptops from being stolen?
A. Proximity badge
B. Safe
C. Cable locks
D. CCTV
Question 4:
A. AES
B. RC4
C. RSA
D. DES
Question 5:
Your organization requires the use of TLS or IPSec for all communications with an
organization's network. Which of the following is this an example of?
A. Data at rest
B. Data in transit
C. Data in use
D. DLP
Question 6:
A. Kerberos
B. ADFS
C. SAML
D. OpenID Connect
Question 7:
You have just completed identifying, analyzing, and containing an incident. You have
verified that the company uses older unencrypted SSDs as part of their default
configuration, and the manufacturer does not provide a SE utility for the devices. The
storage devices contained top-secret data that would bankrupt the company if it fell into a
competitor’s hands. After safely extracting the device's data and saving it to a new self-
encrypting drive, you have been asked to dispose of the SSDs securely. Which of the
following methods should you use?
(Sample Simulation – On the real exam for this type of question, you would receive 3-5
pictures and be asked to drag and drop them into place next to the correct term.)
Larger image
How would you appropriately categorize the authentication method being displayed here?
A. Biometric authentication
B. One-time password authentication
C. Multi-factor authentication
D. PAP authentication
Question 9:
Which of the following is NOT a means of improving data validation and trust?
A. Infrastructure as a Service
B. Platform as a Service
C. Software as a Service
D. Function as a Service
Question 11:
A. MD-5
B. SHA-1
C. NTLM
D. SHA-2
Question 12:
You have been asked to help design a new architecture for Dion Training’s website. The
current architecture involves a single server that hosts the website in its entirety. The
company’s newest course has been creating a lot of interest on social media. The CIO is
concerned that the single server will not be able to handle the increased demand that could
result from this increased publicity. What technology should you implement in the new
architecture to allow multiple web servers to serve up the courses and meet this expected
increase in demand from new students?
A. VPN concentrator
B. DLP
C. RAID
D. Load balancer
Question 13:
You are trying to find a rogue device on your wired network. Which of the following
options would NOT help find the device?
A. MAC validation
B. Port scanning
C. Site surveys
D. War walking
Question 14:
A salesperson's laptop has become unresponsive after attempting to open a PDF in their
email. A cybersecurity analyst reviews the IDS and anti-virus software for any alerts or
unusual behavior but finds nothing suspicious. Which of the following threats would BEST
classify this scenario?
A. Ping of death
B. Zero-day malware
C. PII exfiltration
D. RAT
Question 15:
What type of malware changes its binary pattern in its code on specific dates or times to
avoid detection by antimalware software?
A. Logic bomb
B. Trojan
C. Ransomware
D. Polymorphic virus
Question 16:
A security analyst conducts a nmap scan of a server and found that port 25 is open. What
risk might this server be exposed to?
Question 17:
A macOS user is browsing the internet in Google Chrome when they see a notification that
says, "Windows Enterprise Defender: Your computer is infected with a virus, please click
here to remove it!" What type of threat is this user experiencing?
A. Phishing
B. Rogue anti-virus
C. Pharming
D. Worm
Question 18:
A cybersecurity analyst from BigCorp contacts your company to notify them that several
of your computers were seen attempting to create a denial of service condition against their
servers. They believe your company has become infected with malware, and those
machines were part of a larger botnet. Which of the following BEST describes your
company's infected computers?
A. Monsters
B. Zero-day
C. Zombie
D. Bugs
Question 19:
Question 20:
Richard attempted to visit a website and received a DNS response from the DNS cache
server pointing to the wrong IP address. Which of the following attacks has occurred?
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
The analyst contacts the web developer and asks for a copy of the source code to the
logon.php script. The script is as follows:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
php
include(‘../../config/db_connect.php’);
$user = $_GET[‘user’];
$pass = $_GET[‘pass’];
$sql = “SELECT * FROM USERS WHERE username = ‘$user’ AND password = ‘$pass’”;
?>
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Based on source code analysis, which type of vulnerability is this web server vulnerable to?
A. Command injection
B. SQL injection
C. Directory traversal
D. LDAP injection
Question 22:
You have just received a phishing email disguised to look like it came from
support@diontraining.com asking you to send your username and password because your
account has been locked out due to inactivity. Which of the following social engineering
principles is being used in this email?
A. Intimidation
B. Urgency
C. Consensus
D. Trust
Question 23:
Which of the following is a best practice that should be followed when scheduling
vulnerability scans of an organization's data center?
Question 24:
Question 25:
Which of the following types of attacks are usually used as part of a man-in-the-middle
attack?
A. Brute force
B. Spoofing
C. DDOS
D. Tailgating
Question 27:
What technique is an attacker using if they review data and publicly available information
to gather intelligence about the target organization without scanning or other technical
information-gathering activities?
A. Passive reconnaissance
B. Active scanning
C. Vulnerability scanning
D. Patch management
Question 28:
You just received a notification that your company's email servers have been blacklisted
due to reports of spam originating from your domain. What information do you need to
start investigating the source of the spam emails?
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Then, you clicked the search button, and a pop-up box appears on your screen showing the
following text, "This site is vulnerable to an attack!" Based on this response, what
vulnerability have you uncovered in the web application?
A. Buffer overflow
B. Cross-site request forgery
C. Distributed denial of service
D. Cross-site scripting
Question 30:
While investigating a data breach, you discover that the account credentials used belonged
to an employee who was fired several months ago for misusing company IT systems.
Apparently, the IT department never deactivated the employee's account upon their
termination. Which of the following categories would this breach be classified as?
A. Insider Threat
B. Zero-day
C. Known threat
D. Advanced persistent threat
Question 31:
You are conducting threat hunting for an online retailer. Upon analyzing their web server,
you identified that a single HTML response returned as 45 MB in size, but an average
response is normally only 275 KB. Which of the following categories of potential indicators
of compromise would you classify this as?
A. Beaconing
B. Data exfiltration
C. Introduction of new accounts
D. Unauthorized privilege
Question 32:
A. SCADA
B. ICS
C. Smart television
D. Laptop
Question 33:
You have been asked to develop a solution for one of your customers. The customer is a
software development company, and they need to be able to test a wide variety of operating
systems to test the software applications their company is developing internally. The
company doesn't want to buy a bunch of computers to install all of these operating systems
for testing. Which of the following solutions would BEST meet the company's Start
requirements?
A. Purchase a high-end computer that has a lot of CPU cores and RAM, install a
hypervisor, and configure a virtual machine for each operating system that will be
used to test the applications being developed
B. Purchase multiple inexpensive workstations and install one operating system that
will be used to test the applications being developed on each workstation
C. Purchase multiple workstations, install a VM on each one, then install one
operating system that will be used to test the applications being developed in each
VM
D. Purchase one computer, install an operating system on it, create an image of the
system, then reformat it, install the next operating system, create another image,
and reimage the machine each time you need to test a different application
Question 34:
Dion Training has set up a lab consisting of 12 laptops for students to use outside of normal
classroom hours. The instructor is worried that a student may try to steal one of the
laptops. Which of the following physical security measures should be used to ensure the
laptop is not stolen or moved out of the lab environment?
a. USB locks
b. Entry control roster
c. Cable locks
d. Biometric locks
Question 35:
(Sample Simulation – On the real exam for this type of question, you would receive 3-5
pictures and be asked to drag and drop them into place next to the correct term.)
Larger image
How would you appropriately categorize the authentication method being displayed here?
A. Biometric authentication
B. One-time password authentication
C. Multifactor authentication
D. PAP authentication
Question 36:
Which of the following protocols could be used inside a virtual system to manage and
monitor the network?
A. SNMP
B. SMTP
C. BGP
D. EIGRP
Question 37:
A. RADIUS
B. Kerberos
C. PKI
D. LDAP
Question 38:
Which of the following tools could be used to detect unexpected output from an application
being managed or monitored?
Question 39:
Which of the following types of access control provides the strongest level of protection?
A. RBAC
B. MAC
C. DAC
D. ABAC
Question 40:
What type of wireless security measure can easily be defeated by a hacker by spoofing the
hardware address of their network interface card?
A. MAC filtering
B. WEP
C. Disable SSID broadcast
D. WPS
Question 41:
Your firewall is blocking outbound email traffic that is attempting to be sent. Which port
should you verify is set to ALLOW in the firewall to ensure your emails are being sent?
A. 22
B. 25
C. 80
D. 143
Question 42:
(Sample Simulation – On the real exam for this type of question, you would have to fill in
the blanks by dragging and dropping them into place.)
Larger image
Using the image provided, select four security features that you should use with a
smartphone provided through a COPE policy in your organization?
Question 43:
Your company is adopting a new BYOD policy for tablets and smartphones. Which of the
following would allow the company to secure the sensitive information on personally owned
devices and the ability to remote wipe corporate information without the user's affecting
personal data?
A. Face ID
B. Long and complex passwords
C. Touch ID
D. Containerization
Question 45:
A user reports that every time they try to access https://www.diontraining.com, they
receive an error stating "Invalid or Expired Security Certificate." The technician attempts
to connect to the same site from other computers on the network, and no errors or issues
are observed. Which of the following settings needs to be changed on the user's workstation
to fix the "Invalid or Expired Security Certificate" error?
A. Logon times
B. Date and time
C. User access control
D. UEFI boot mode
Question 46:
A. Fuzzing
B. Sequential data sets
C. Static code analysis
D. Known bad data injection
Question 48:
Your organization has recently suffered a data breach due to a server being exploited. As a
part of the remediation efforts, the company wants to ensure that the default administrator
password on each of the 1250 workstations on the network is changed. What is the easiest
way to perform this password change requirement?
Question 49:
Which of the following protocols is considered insecure and should never be used in your
networks?
A. Telnet
B. SSH
C. SFTP
D. HTTPS
Question 50:
Which of the following access control methods provides the most detailed and explicit type
of access control over a resource?
A. MAC
B. RBAC
C. DAC
D. ABAC
Question 51:
During a penetration test of your company’s network, the assessor came across a
spreadsheet with the passwords being used for several of the servers. Four of the passwords
recovered are listed below. Which one is the weakest password and should be changed
FIRST to increase the password’s complexity?
A. P@$$w0rd
B. Pa55w0rd
C. P@$$W0RD
D. pa55word
Question 52:
You are installing a new wireless network in your office building and want to ensure it is
secure. Which of the following configurations would create the MOST secure wireless
network?
Why would a company want to utilize a wildcard certificate for their servers?
Question 54:
You are trying to select the best device to install to detect an outside attacker trying to
reach into your internal network. The device should log the event, but it should not take
any action to stop it. Which of the following devices would be the BEST for you to select?
A. Proxy server
B. Authentication server
C. IPS
D. IDS
Question 55:
William would like to use full-disk encryption on his laptop. He is worried about slow
performance, though, so he has requested that the laptop have an onboard hardware-based
cryptographic processor. Based on this requirement, what should William ensure the
laptop contains?
A. AES
B. FDE
C. PAM
D. TPM
Question 56:
You have discovered that an employee has been conducting illegal activities using his
workplace computer. You have taken possession of the employee's laptop according to your
company's procedures and are waiting to give it to law enforcement authorities. What
should you do when turning over the laptop to the police?
Question 57:
Your coworker is creating a script to run on a Windows server using PowerShell. Which of
the following file formats should the file be in?
A. .bat
B. .sh
C. .py
D. .ps1
Question 58:
A. Order of volatility
B. Legal hold
C. Chain of custody
D. Right to audit
Question 59:
You are the first forensic analyst to arrive on the scene of a data breach. You have been
asked to begin evidence collection on the server while waiting for the rest of your team to
arrive. Which of the following evidence should you capture first?
Question 60:
You are conducting an incident response and want to determine if any account-based
indicators of compromise (IoC) exist on a compromised server. Which of the following
would you NOT search for on the server?
A. Off-hours usage
B. Malicious processes
C. Unauthorized sessions
D. Failed logins
Question 61:
What popular open-source port scanning tool is commonly used for host discovery and
service identification?
A. nmap
B. dd
C. services.msc
D. Nessus
Question 62:
Dion Consulting Group has recently been awarded a contract to provide cybersecurity
services for a major hospital chain in 48 cities across the United States. You are conducting
a vulnerability scan of the hospital's enterprise network when you detect several devices
that could be vulnerable to a buffer overflow attack. Upon further investigation, you
determine that these devices are PLCs used to control the hospital's elevators.
Unfortunately, there is not an update available from the elevator manufacturer for these
devices. Which of the following mitigations do you recommend?
A. Recommend immediate replacement of the PLCs with ones that are not
vulnerable to this type of attack
B. Recommend isolation of the elevator control system from the rest of the
production network through the change control process
C. Conduct a penetration test of the elevator control system to prove that the
possibility of this kind of attack exists
D. Recommend immediate disconnection of the elevator's control system from the
enterprise network
Question 63:
Due to a worldwide pandemic in 2020 caused by the COVID-19 virus, Dion Training
Solutions instituted teleworking for all of its employees. This was part of a preplanned
response so that the company's students could continue to learn and receive support
throughout the pandemic. Which of the following plans should contain the company's
pandemic response plan?
Question 64:
Which security tool is used to facilitate incident response, threat hunting, and security
configuration by orchestrating automated runbooks and delivering data enrichment?
A. SIEM
B. SOAR
C. MDM
D. DLP
Question 65:
Your company is required to remain compliant with PCI-DSS due to the type of
information processed by your systems. If there was a breach of this data, which type of
disclosure would you be required to provide during your incident response efforts?
Question 66:
You have been hired to investigate a possible insider threat from a user named Terri.
Which command would you use to review all sudo commands ever issued by Terri (whose
login account is terri and UID=1003) on a Linux system? (Select the MOST efficient
command)
Question 67:
Which of the following tools is useful for capturing Windows memory data for forensic
analysis?
a. dd
b. Memdump
c. Wireshark
d. Nessus
Question 68:
A. Attempt to identify all the false positives and exceptions, then resolve any
remaining items
B. Wait to perform any additional scanning until the current list of vulnerabilities
have been remediated fully
C. Place any assets that contain PHI in a sandbox environment and then remediate all
the vulnerabilities
D. Filter the scan results to include only those items listed as critical in the asset
inventory and remediate those vulnerabilities first
Question 69:
During an assessment of the POS terminals that accept credit cards, a cybersecurity
analyst notices a recent Windows operating system vulnerability exists on every terminal.
Since these systems are all embedded and require a manufacturer update, the analyst
cannot install Microsoft's regular patch. Which of the following options would be best to
ensure the system remains protected and are compliant with the rules outlined by the PCI
DSS?
Question 70:
Dion Training has performed an assessment as part of their disaster recovery planning.
The assessment found that their file server has crashed twice in the last two years. The
most recent time was in August, and the time before that was 15 months before. Which of
the following metrics would best represent this 15 month time period?
A. RTO
B. RPO
C. MTTR
D. MTBF
Question 71:
What is the biggest disadvantage of using single sign-on (SSO) for authentication?
Question 72:
Dion Training has performed an assessment as part of their disaster recovery planning.
The assessment found that the organization can only tolerate a maximum of 30 minutes of
downtime for their public-facing webserver. Which of the following metrics would best
represent this time period?
A. RTO
B. RPO
C. MTBF
D. MTTR
Question 73:
Which of the following agreements is used between companies and employees, between
companies and contractors, and between two companies to protect information assets?
A. ISA
B. NDA
C. SLA
D. DSUA
Question 74:
Your company is expanding its operations in the European Union and is concerned about
additional governmental regulations that may apply. Which of the following regulations
applies when processing personal data within the European Union?
A. PHI
B. PCI
C. GDPR
D. PII
Question 75:
Janet, a defense contractor for the military, performs an analysis of their enterprise
network to identify what type of work the Army would be unable to perform if the network
were down for more than a few days. Which of the following was Janet trying to identify?
Question 76:
Which of the following methods is used to replace all or part of a data field with a
randomly generated number used to reference the original value stored in another vault or
database?
A. Data masking
B. Anonymization
C. Tokenization
D. Data minimization
Question 77:
A cybersecurity analyst is analyzing what they believe to be an active intrusion into their
network. The indicator of compromise maps to suspected nation-state group that has
strong financial motives, APT 38. Unfortunately, the analyst finds their data correlation
lacking and cannot determine which assets have been affected, so they begin to review the
list of network assets online. The following servers are currently online: PAYROLL_DB,
DEV_SERVER7, FIREFLY, DEATHSTAR, THOR, and DION. Which of the following
actions should the analyst conduct first?
Dion Training is currently undergoing an audit of its information systems. The auditor
wants to understand better how the PII data from a particular database is used within
business operations. Which of the following employees should the auditor interview?
A. Data owner
B. Data steward
C. Data controller
D. Data privacy officer
Question 79:
Question 80:
Which of the following authentication mechanisms involves receiving a one-time use shared
secret password, usually through a token-based key fob or smartphone app, that does not
expire?
A. HOTP
B. Smart card
C. TOTP
D. EAP