,Security+ Guide to Network Security Fundamentals (Chapter 1-15 Questions)Mar
Ciampa (6th Edition)
*Chapter 1*: *Introduction to Network Security*
1. Ian recently earned his security certification and has been offered a
promotion to a position that requires him to analyze and design security
solutions as well as identifying users' needs. Which of these generally
recognized security positions has Ian been offered?
a. Security administrator
b. Security technician
c. Security officer
d. Security manager: *a. Security administrator*
b. Security technician
c. Security officer
d. Security manager
2. Alyona has been asked by her supervisor to give a presentation
regarding reasons why security attacks continue to be successful. She
has decided to focus on the issue of widespread vulnerabilities. Which
of the following would Alyona NOT include in her presentation?
a. Large number of vulnerabilities
b. End-of-life systems
c. Lack of vendor support
,d. Misconfigurations Answer: . Large number of vulnerabilities
b. End-of-life systems
c. Lack of vendor support
*d. Misconfigurations*
3. Tatyana is discussing with her supervisor potential reasons why a
recent attack was successful against one of their systems. Which of
the following configuration issues would NOT covered?
a. Default configurations
b. Weak configurations
c. Vulnerable business processes*
d. Misconfigurations Answer: . Default configurations
b. Weak configurations
*c. Vulnerable business processes*
d. Misconfigurations
4. What is a race condition?
a. When a vulnerability is discovered and there is a race to see if it
can be patched before it is exploited by attackers.
b. When two concurrent threads of execution access a shared resource
simul- taneously, resulting in unintended consequences.
c. When an attack finishes its operation before antivirus can
complete its work.
d. When a software update is distributed prior to a vulnerability being
discov- ered. Answer: . When a vulnerability is discovered and there is a race to
see if it can be patched before it is exploited by attackers.
, *b. When two concurrent threads of execution access a shared resource simultane-
ously, resulting in unintended consequences.*
c. When an attack finishes its operation before antivirus can complete its work.
d. When a software update is distributed prior to a vulnerability being discovered.
5. Which the following is NOT a reason why it is difficult to defend
against today's attackers?
a. Delay in security updating
b. Greater sophistication of defense tools
c. Increased speed of attacks
d. Simplicity of attack tools Answer: . Delay in security updating
*b. Greater sophistication of defense tools*
c. Increased speed of attacks
d. Simplicity of attack tools
6. Which of the following is NOT true regarding security?
a. Security is a goal.
b. Security includes the necessary steps to protect from harm.
c. Security is a process.
d. Security is a war that must be won at all costs. Answer: . Security is a go
b. Security includes the necessary steps to protect from harm.
c. Security is a process.
*d. Security is a war that must be won at all costs.*
7. Adone is attempting to explain to his friend the relationship between
secu- rity and convenience. Which of the following statements would
he use?