25 Random Security+ Questions

Posted by:

|

On:

|

0%

25 Random Questions Security+

1 / 25

During a security audit of an organization’s identity and access management (IAM) practices, the auditor discovers that the company does not have a formal process for conducting regular access reviews. Which of the following represents the MOST significant risk associated with this finding?

2 / 25

What is the MOST effective way to measure the return on investment (ROI) of a security awareness program?

3 / 25

An attacker sends a series of carefully fragmented IP packets to a target system. When the system attempts to reassemble these packets, it crashes due to a flaw in its IP fragmentation reassembly process. What type of attack is this?

4 / 25

An attacker sends a large number of ICMP echo request (ping) packets to a target network’s broadcast address, spoofing the source IP address to be that of the intended victim. All hosts on the target network then respond to the victim’s IP address, overwhelming it with traffic. What type of attack is this?

5 / 25

Which of the following is the BEST method for tracking portable devices such as laptops and tablets in an organization?

6 / 25

Which of the following describes a vulnerability where an attacker can manipulate serialized objects to perform malicious actions?

7 / 25

A security assessor is evaluating the effectiveness of an organization’s security information and event management (SIEM) system. Which of the following testing methods would provide the MOST comprehensive assessment of the SIEM’s capabilities?

8 / 25

Which of the following describes a vulnerability where sensitive data is transmitted or stored without proper encryption?

9 / 25

An attacker sends a fake security alert email to multiple employees, claiming that their system is at risk and they need to download and install an attached “security patch”. What type of social engineering attack is this?

10 / 25

A security team is conducting a vulnerability assessment of their network. Which of the following tools would be MOST appropriate for this task?

11 / 25

An attacker sets up a malicious Wi-Fi access point with the same SSID as a legitimate network. When users connect to this rogue access point, the attacker can intercept and manipulate their network traffic. What type of attack is this?

12 / 25

Which of the following is a secure protocol used for directory services that encrypts all traffic between the client and server?

13 / 25

An organization is implementing a secure boot process for their IoT devices. Which of the following is MOST crucial for establishing a root of trust in this scenario?

14 / 25

A security administrator is implementing a new access control system. Which of the following access control models is BEST suited for a military environment with strict hierarchical security levels?

15 / 25

A security administrator wants to implement a solution that can detect and prevent network attacks in real-time without impacting legitimate traffic. Which of the following is the MOST appropriate choice?

16 / 25

An organization is implementing a next-generation firewall (NGFW) to enhance network security. Which of the following capabilities is MOST characteristic of an NGFW compared to a traditional firewall?

17 / 25

Which of the following technologies is BEST suited for protecting against email spoofing and phishing attacks?

18 / 25

What is the primary function of a Hardware Security Module (HSM) in PKI?

19 / 25

A security assessor is evaluating the effectiveness of an organization’s web application firewall (WAF). Which of the following testing methodologies would provide the MOST comprehensive assessment of the WAF’s capabilities?

20 / 25

Which of the following BEST describes the concept of context-aware authentication for mobile devices?

21 / 25

Which of the following threat actors is MOST likely to be motivated by ideology or social causes?

22 / 25

Which of the following best describes the primary purpose of a Public Key Infrastructure (PKI)?

23 / 25

What is the MOST effective approach to ensure that remote workers maintain good security practices?

24 / 25

A company is implementing a service mesh architecture for their microservices-based applications. Which of the following is the MOST significant security benefit of using a service mesh?

25 / 25

An organization is implementing a data protection strategy for its cloud-based infrastructure. Which of the following BEST describes the concept of data lineage in this context?

Your score is

Exit

One response to “25 Random Security+ Questions”