25 Random Security+ Questions

Posted by:

|

On:

|

0%

25 Random Questions Security+

1 / 25

Which vulnerability occurs when an application fails to properly validate SSL/TLS certificates, potentially allowing man-in-the-middle attacks?

2 / 25

An organization wants to implement single sign-on (SSO) for their cloud services. Which of the following protocols is MOST commonly used for this purpose?

3 / 25

Which of the following is a common goal of social engineering attacks?

4 / 25

A company is implementing a new access control system for their research department. Which of the following access control models would be MOST appropriate if the goal is to restrict access based on the sensitivity level of the data and the clearance level of the users?

5 / 25

An e-commerce company is updating its privacy policy to comply with new data protection regulations. Which of the following elements is MOST crucial to include in the updated policy?

6 / 25

Which of the following is responsible for issuing and managing digital certificates in a PKI?

7 / 25

Which of the following is a key advantage of using Infrastructure as Code (IaC) for automating security configurations?

8 / 25

An organization is implementing a security information and event management (SIEM) system in their hybrid cloud environment. Which of the following is the MOST important consideration to ensure effective threat detection across both on-premises and cloud infrastructures?

9 / 25

What is the MOST effective approach to ensure that remote workers maintain good security practices?

10 / 25

Which of the following is the BEST method for tracking portable devices such as laptops and tablets in an organization?

11 / 25

An organization wants to implement a solution that can prevent data exfiltration through email attachments. Which of the following is the BEST choice?

12 / 25

An attacker sends a large number of ICMP echo request (ping) packets to a target network’s broadcast address, spoofing the source IP address to be that of the intended victim. All hosts on the target network then respond to the victim’s IP address, overwhelming it with traffic. What type of attack is this?

13 / 25

To enhance security awareness, a company creates a fake phishing website mimicking the login page of the company’s employee portal. Employees are directed to the site via an internal training module to see if they enter their credentials. This method is known as:

14 / 25

Which of the following is the BEST approach to ensure that security awareness training remains relevant and engaging over time?

15 / 25

An attacker closely follows an authorized employee into a secured building by quickly slipping in before the door closes, without using a badge. What type of social engineering attack is this?

16 / 25

Which of the following is the MOST effective way to mitigate the risk of data exposure when an employee uses their personal mobile device for work?

17 / 25

A company wants to implement a solution that can prevent data exfiltration through email attachments. Which of the following is the BEST choice?

18 / 25

What is the main advantage of using Online Certificate Status Protocol (OCSP) over Certificate Revocation Lists (CRLs)?

19 / 25

A security team discovers that an attacker has been able to execute system commands on a web server by injecting malicious input into a form field that is passed directly to a system function. What type of vulnerability has the attacker exploited?

20 / 25

Which vulnerability occurs when an application fails to properly handle errors, potentially revealing sensitive information to attackers?

21 / 25

Which of the following is an effective countermeasure against phishing attacks?

22 / 25

A security team needs to assess the security posture of their organization’s web applications. Which of the following tools would be MOST appropriate for this task?

23 / 25

What is the primary purpose of a wildcard certificate in PKI?

24 / 25

A company wants to implement a solution that can prevent unauthorized access to its network resources based on the security posture of connecting devices. Which of the following is the MOST appropriate choice?

25 / 25

A security analyst wants to create a script that will automatically scan the organization’s network for open ports and vulnerable services. Which of the following tools would be BEST suited for integration into this script?

Your score is

Exit

Leave a Reply

Your email address will not be published. Required fields are marked *