Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Security+ CertMaster Exam with Correct Solutions

Beoordeling
-
Verkocht
-
Pagina's
40
Cijfer
A+
Geüpload op
25-11-2024
Geschreven in
2024/2025

Which security related phrase relates to the integrity of data? - Modification An organization stores data in different geographic locations for redundancy. This data replicates so that it is the same in all locations. Engineers discover that some replicas are lagging with updates. What configuration do the engineers discover as the cause? - Asynchronous replication A systems engineer configures a disk volume with a Redundant Array of Independent Disks (RAID) solution. Which solution does the engineer utilize when allowing for the failure of two disks? - Level 6 A systems engineer reviews recent backups for a production server. While doing so, the engineer discovers that archive bits on files are clearing and incorrect backup types have been occurring. Which backup type did the engineer intend to use if the bit should not be cleared? - Differential Management has reason to believe that someone internal to the organization is committing fraud. To confirm their suspicion, and to collect evidence, they need to set up a system to capture the events taking place. Evaluate which option will best fit the organization's needs. - Honeypot IT staff looks to provide a high level of fault tolerance while implementing a new server. With which systems configuration approach does the staff achieve this goal? - Focusing on critical components An engineer looks to implement security measures by following the five functions in the National Institute of Standards and Technology (NIST) Cybersecurity Framework. When documenting the "detect" function, what does the engineer focus on? - Ongoing proactive monitoring Any external responsibility for an organization's security lies mainly with which individuals? - The owner How might the goals of basic network management not be well-aligned with the goals of security? - Management focuses on availability over confidentiality.

Meer zien Lees minder
Instelling
Security+ CertMaster
Vak
Security+ CertMaster

Voorbeeld van de inhoud

Security+ CertMaster Exam with Correct
Solutions
Which security related phrase relates to the integrity of data? - ✅✅ Modification

An organization stores data in different geographic locations for redundancy. This
data replicates so that it is the same in all locations. Engineers discover that some
replicas are lagging with updates. What configuration do the engineers discover as
the cause? - ✅✅ Asynchronous replication

A systems engineer configures a disk volume with a Redundant Array of
Independent Disks (RAID) solution. Which solution does the engineer utilize when
allowing for the failure of two disks? - ✅✅ Level 6

A systems engineer reviews recent backups for a production server. While doing
so, the engineer discovers that archive bits on files are clearing and incorrect
backup types have been occurring. Which backup type did the engineer intend to
use if the bit should not be cleared? - ✅✅ Differential

Management has reason to believe that someone internal to the organization is
committing fraud. To confirm their suspicion, and to collect evidence, they need to
set up a system to capture the events taking place. Evaluate which option will best
fit the organization's needs. - ✅✅ Honeypot

IT staff looks to provide a high level of fault tolerance while implementing a new
server. With which systems configuration approach does the staff achieve this
goal? - ✅✅ Focusing on critical components

An engineer looks to implement security measures by following the five functions
in the National Institute of Standards and Technology (NIST) Cybersecurity
Framework. When documenting the "detect" function, what does the engineer
focus on? - ✅✅ Ongoing proactive monitoring

Any external responsibility for an organization's security lies mainly with which
individuals? - ✅✅ The owner

,How might the goals of basic network management not be well-aligned with the
goals of security? - ✅✅ Management focuses on availability over confidentiality.

The National Institute of Standards and Technology (NIST) provides a framework
that classifies security-related functions. Which description aligns with the
"respond" function? - ✅✅ Identify, analyze, and eradicate threats.

A company has an annual contract with an outside firm to perform a security audit
on their network. The purpose of the annual audit is to determine if the company is
in compliance with their internal directives and policies for security control. Select
the broad class of security control that accurately demonstrates the purpose of the
audit. - ✅✅ Managerial

The _____ requires federal agencies to develop security policies for computer
systems that process confidential information. - ✅✅ Computer Security Act

After a poorly handled security breach, a company updates its security policy to
include an improved incident response plan. Which of the following security
controls does this update address? - ✅✅ Corrective

The IT department head returns from an industry conference feeling inspired by a
presentation on the topic of cybersecurity frameworks. A meeting is scheduled
with IT staff to brainstorm ideas for deploying security controls by category and
function throughout the organization. Which of the following ideas are consistent
with industry definitions? - ✅✅ Deploy a technical control to enforce network
access policies.

Schedule quarterly security awareness workshops as a preventive control to
mitigate social engineering attacks.

Deploy agents to file servers to perform continuous backups to cloud storage as a
corrective control to mitigate the impact of malware.

Which of the following has a cyber security framework (CSF) that focuses
exclusively on IT security, rather than IT service provisioning? - ✅✅ National
Institute of Standards and Technology (NIST)

,When exploring the deep web, a user will need which of the following to find a
specific and hidden dark web site? - ✅✅ A specific URL

A company technician goes on vacation. While the technician is away, a critical
patch released for Windows servers is not applied. According to the National
Institute of Standards and Technology (NIST), what does the delay in applying the
patch create on the server? - ✅✅ Vulnerability

Which of the following is mostly considered an insider threat? - ✅✅- Former
employee
-Contractor

One aspect of threat modeling is to identify potential threat actors and the risks
associated with each one. When assessing the risk that any one type of threat actor
poses to an organization, what are the critical factors to profile? - ✅✅- Intent
-Motivation

A user with authorized access to systems in a software development firm installs a
seemingly harmless, yet unauthorized program on a workstation without the IT
department's sanction. Identify the type of threat that is a result of this user's action.
- ✅✅ Unintentional insider threat

A contractor has been hired to conduct security reconnaissance on a company. The
contractor browses the company's website to identify employees and then finds
their Facebook pages. Posts found on Facebook indicate a favorite bar that
employees frequent. The contractor visits the bar and learns details of the
company's security infrastructure through small talk. What reconnaissance phase
techniques does the contractor practice? - ✅✅ Open Source Intelligence (OSINT)
Social engineering

What is Open Source Intelligence (OSINT)? - ✅✅ Using web search tools and
social media to obtain information about the target

A security engineer investigates a recent system breach. When compiling a report
of the incident, how does the engineer classify the actor and the vector? - ✅✅
Threat

, An IT manager in the aviation sector checks the industry's threat intelligence feed
to keep up on the latest threats and ensure the work center implements the best
practices in the field. What type of threat intelligence source is the IT manager
most likely accessing? - ✅✅ An Information Sharing and Analysis Center (ISAC)

A Department of Defense (DOD) security team identifies a data breach in progress,
based on some anomalous log entries, and take steps to remedy the breach and
harden their systems. When they resolve the breach, they want to publish the cyber
threat intelligence (CTI) securely, using standardized language for other
government agencies to use. The team will transmit threat data feed via which
protocol? - ✅✅ Trusted Automated exchange of Indicator Information (TAXII)

Which of the following statements summarizes a disadvantage to performing an
active vulnerability scan? - ✅✅ -Active scanning consumes more network
bandwidth.
-Active scanning runs the risk of causing an outage.

An outside security consultant updates a company's network, including data cloud
storage solutions. The consultant leaves the manufacturer's default settings when
installing network switches, assuming the vendor shipped the switches in a default-
secure configuration. Examine the company's network security posture and select
the statements that describe key vulnerabilities in this network. - ✅✅ - The
network is open to third-party risks from using an outside contractor to configure
cloud storage settings.
- The default settings in the network switches represent a weak configuration.

A manufacturing company hires a pen testing firm to uncover any vulnerabilities in
their network with the understanding that the pen tester receives no information
about the company's system. Which of the following penetration testing strategies
is the manufacturing company requesting? - ✅✅ Black box

Examine each attack vector. Which is most vulnerable to escalation of privileges? -
✅✅ Operating System (OS)

A network administrator uses two different automated vulnerability scanners. They
regularly update with the latest vulnerability feeds. If the system regularly
performs active scans, what type of error is the system most likely to make? - ✅✅
False positive

Geschreven voor

Instelling
Security+ CertMaster
Vak
Security+ CertMaster

Documentinformatie

Geüpload op
25 november 2024
Aantal pagina's
40
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€12,66
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
kharowl Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
14
Lid sinds
2 jaar
Aantal volgers
7
Documenten
1509
Laatst verkocht
4 maanden geleden
The Scholar's Depot: Where Knowledge Meets Opportunity

Imagine a digital marketplace buzzing with academic vitality—Kharowl. This knowledgeable entrepreneur curates a treasure trove of meticulously crafted exam materials, sharing a passion for aiding fellow scholars in their academic journeys. Their dedication to excellence shines through every document, fostering a community where knowledge is not just sold but shared.

3,0

2 beoordelingen

5
1
4
0
3
0
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen