Security+ 501 Quiz

Exit

Question 1 of 1

  Time Left


0 [{"id":472352,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:44:52","updated_at":"2018-05-22 14:44:52","questionName":"An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps\r\nshould the responder perform NEXT?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472343,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:35:36","updated_at":"2018-05-22 14:35:36","questionName":"A user suspects someone has been accessing a home network without permission by spoofing the MAC address of an authorized system. While attempting to\r\ndetermine if an authorized user is logged into the home network, the user reviews the wireless router, which shows the following table for systems that are currently\r\non the home network.\r\n\r\nWhich of the following should be the NEXT step to determine if there is an unauthorized user on the network?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/security-501-quiz\/img5.JPG","position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472344,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:36:24","updated_at":"2018-05-23 17:17:28","questionName":"When performing data acquisition on a workstation, which of the following should be captured based on memory volatility? (Select two.)","questionTimeSeconds":"0","questionTimeMinutes":"4","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472355,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:46:59","updated_at":"2018-05-23 17:07:54","questionName":"Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?","questionTimeSeconds":"0","questionTimeMinutes":"4","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472353,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:45:29","updated_at":"2018-05-22 14:45:29","questionName":"A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types\r\nof malware is MOST likely causing this issue?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472354,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:46:21","updated_at":"2018-05-22 14:46:21","questionName":"Which of the following technologies employ the use of SAML? (Select two.)","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472356,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:48:18","updated_at":"2018-05-22 14:48:18","questionName":"After a user reports slow computer performance, a system administrator detects a suspicious file, which was installed as part of a freeware software package. The\r\nsystems administrator reviews the output below:\r\n\r\nBased on the above information, which of the following types of malware was installed on the user\u2019s computer?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/security-501-quiz\/img8.JPG","position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472346,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:38:44","updated_at":"2018-05-23 17:21:39","questionName":"An attacker compromises a public certificate authority (CA) and issues unauthorized X.509 certificates for Company.com. In the future, Company.com wants to mitigate the impact of similar incidents. Which of the following would assist Company.com with its goal?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"Certificate Pinning: A method of trusting digital certs that bypass the CA hierarchy and chain of trust to minimize man-in-the-middle attacks.\r\n\r\n","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472358,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:49:37","updated_at":"2018-05-22 14:49:37","questionName":"An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted\r\nauthentication of wireless clients over TLS?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472323,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:08:56","updated_at":"2018-05-22 14:08:56","questionName":"An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Management is looking\r\nfor a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472345,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:37:58","updated_at":"2018-05-22 14:37:58","questionName":"A systems administrator is reviewing the following information from a compromised server:\r\n\r\nGiven the above information, which of the following processes was MOST likely exploited via a remote buffer overflow attack?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/security-501-quiz\/img6.JPG","position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472357,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:48:54","updated_at":"2018-05-22 14:48:54","questionName":"Which of the following network vulnerability scan indicators BEST validates a successful, active scan?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472351,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:44:14","updated_at":"2018-05-22 14:44:14","questionName":"A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following\r\nshould be implemented in the administrator does not want to provide the wireless password or he certificate to the employees?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472347,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:39:14","updated_at":"2018-05-22 14:39:14","questionName":"A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to\r\nprovide the domain administrator credentials. Which of the following account types is the systems administrator using?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null},{"id":472350,"quiz_id":"24075","answer_id":null,"answerType_id":"0","created_at":"2018-05-22 14:43:39","updated_at":"2018-05-22 14:43:39","questionName":"A security administrator has found a hash in the environment known to belong to malware. The administrator then finds this file to be in in the preupdate area of the\r\nOS, which indicates it was pushed from the central patch system.\r\n\r\nFile: winx86_adobe_flash_upgrade.exe\r\nHash: 99ac28bede43ab869b853ba62c4ea243\r\n\r\nThe administrator pulls a report from the patch management system with the following output:\r\n\r\n\r\nGiven the above outputs, which of the following MOST likely happened?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/security-501-quiz\/img7.JPG","position":null,"explanation":"","question_score_id":null,"lang":"","questionAudioPath":null}]
472352
0
120
block

An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps should the responder perform NEXT?

Select the Correct Answers  

(0/0)












472343
0
120
none
472344
0
240
none
472355
0
240
none
472353
0
120
none
472354
0
120
none
472356
0
120
none
472346
0
120
none
472358
0
120
none
472323
0
60
none
472345
0
120
none
472357
0
120
none
472351
0
120
none
472347
0
120
none
472350
0
120
none