Sec+ A6-A36 Exam 

The process of answering a test question is our ultimate test of knowledge. After hours of video watching, book reading, and note taking, do you really know the material? If you're trying to prove yourself, nothing beats getting the right answer.

Sign in to Google to save your progress. Learn more

A security administrator is concerned about data exfiltration resulting from the use of malicious phone charging stations. Which of the following would be the BEST way to protect against this threat?

*
5 points

A remote user has received a text message requesting login details to the corporate VPN server. Which of the following would BEST describe this message?

*
5 points

Which of these protocols use TLS to provide secure communication?

(Select TWO)

*
5 points
Required

A security incident has occurred on a file server. Which of the following

data sources should be gathered to address file storage volatility?

(Select TWO)

*
5 points
Required

Which of the following standards provides information on privacy and managing PII?

*
5 points

A user connects to a third-party website and receives this message:

Your connection is not private.

NET::ERR_CERT_INVALID

Which of the following attacks would be the MOST likely reason for this message?

*
5 points

You’ve hired a third-party to gather information about your company’s servers and data. The third-party will not have direct access to your internal network but can gather information from any other source.

Which of the following would BEST describe this approach?

*
5 points

A network administrator would like each user to authenticate with their personal username and password when connecting to the company's wireless network. Which of the following should the network administrator configure on the wireless access points?

*
5 points

An IPS at your company has found a sharp increase in traffic from all-in-one printers. After researching, your security team has found a vulnerability associated with these devices that allows the device to be remotely controlled by a third-party. 

Which category would BEST describe these devices?

*
5 points

Which of the following would be the BEST way to provide a website login using existing credentials from a third-party site?

*
5 points

A company is creating a security policy that will protect all corporate mobile devices:

• All mobile devices must be automatically locked after a predefined time period.

• Some mobile devices will be used by the remote sales teams, so the location of each device needs to be traceable.

• All of the user’s information should be completely separated from company data.

Which of the following would be the BEST way to establish these security policy rules?

*
5 points

A security engineer runs a monthly vulnerability scan. The scan doesn’t list any vulnerabilities for Windows servers, but a significant vulnerability was announced last week and none of the servers are patched yet. Which of the following best describes this result?

*
5 points

A company would like to protect the data stored on laptops used in the field. Which of the following would be the BEST choice for this requirement?

*
5 points

A file server has a full backup performed each Monday at 1 AM. Incremental backups are performed at 1 AM on Tuesday, Wednesday, Thursday, and Friday. The system administrator needs to perform a full recovery of the file server on Thursday afternoon. How many backup sets would be required to complete the recovery?

*
5 points

A security administrator has been using EAP-FAST wireless authentication since the migration from WEP to WPA2. The company’s network team now needs to support additional authentication protocols inside of an encrypted tunnel. Which of the following would meet the network team’s requirements?

*
5 points

A system administrator, Daniel, is working on a contract that will specify a minimum required uptime for a set of Internet-facing firewalls. Daniel needs to know how often the firewall hardware is expected to fail between repairs. Which of the following would BEST describe this information?

*
5 points

A security administrator needs to identify all references to a Javascript file in the HTML of a web page. Which of the following tools should be used to view the source of the web page and search through the file for a specific filename? (Select TWO)

*
5 points
Required

An insurance company has created a set of policies to handle data breaches. The security team has been given this set of requirements based on these policies:

• Access records from all devices must be saved and archived

• Any data access outside of normal working hours must be immediately reported

• Data access must only occur inside of the country

• Access logs and audit reports must be created from a single database

Which of the following should be implemented by the security team to meet these requirements? (Select THREE)

*
5 points
Required

A recent audit has found that existing password policies do not include any restrictions on password attempts, and users are not required to periodically change their passwords. Which of the following would correct these policy issues? (Select TWO)

*
5 points
Required

An attacker calls into a company’s help desk and pretends to be the director of the company’s manufacturing department. The attacker states that they have forgotten their password and they need to have the password reset quickly for an important meeting. What kind of attack would BEST describe this phone call?

*
5 points

A security administrator is adding additional authentication controls to the existing infrastructure. Which of the following should be added by the security administrator? (Select TWO)

*
5 points
Required

Which of these threat actors would be MOST likely to attack systems for direct financial gain?

*
5 points

What kind of security control is associated with a login banner?

*
5 points

The embedded OS in a company’s time clock appliance is configured to reset the file system and reboot when a file system error occurs. On one of the time clocks, this file system error occurs during the startup process and causes the system to constantly reboot. Which of the following BEST describes this issue?

*
5 points
A CISO (Chief Information Security Officer) would like to decrease the response time when addressing security incidents. Unfortunately, the company does not have the budget to hire additional security engineers.

Which of the following would assist the CISO with this requirement?

*
5 points

Rodney, a security engineer, is viewing this record from the firewall logs:

UTC 04/05/2018 03:09:15809 AV Gateway Alert

136.127.92.171 80 -> 10.16.10.14 60818

Gateway Anti-Virus Alert:

XPACK.A_7854 (Trojan) blocked.

Which of the following can be observed from this log information?

*
5 points

A user has assigned individual rights and permissions to a file on their network drive. The user adds three additional individuals to have read- only access to the file. Which of the following would describe this access control model?

*
5 points

Which of the following would be commonly provided by a CASB (Cloud Access Security Broker) ? (Select TWO)

*
5 points
Required

A business manager is documenting a set of steps for processing orders if the primary Internet connection fails. Which of these would BEST describe these steps?

*
5 points

A security team has been provided with a non-credentialed vulnerability scan report created by a third-party. Which of the following would they expect to see on this report?

*
5 points

Elizabeth, a security administrator, is concerned about the potential for data exfiltration using external storage drives. Which of the following would be the BEST way to prevent this method of data exfiltration?

*
5 points
Submit
Clear form
This content is neither created nor endorsed by Google.