100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Security+ Midterm and Final Questions and Correct Answers the Latest Update $13.49   Add to cart

Exam (elaborations)

Security+ Midterm and Final Questions and Correct Answers the Latest Update

 8 views  0 purchase
  • Course
  • Security
  • Institution
  • Security

Sean is an information security architect at a financial firm. As his first project, he must design and build an efficient, sure-shot, yet cost-effective solution to detect and prevent bank credit card fraud. How should Sean proceed? Design a solution that keeps track of dates, times, locatio...

[Show more]

Preview 4 out of 31  pages

  • October 21, 2024
  • 31
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Security
  • Security
avatar-seller
Examify
#Examify | #OnlineExams | #TestPrep | #StudyResources | #AcademicSuccess |
#ExamPreparation | #QuizTime | #LearningTools | #Education | #StudentSupport




Security+ Midterm and Final Questions
and Correct Answers the Latest Update
Sean is an information security architect at a financial firm. As his first project,

he must design and build an efficient, sure-shot, yet cost-effective solution to

detect and prevent bank credit card fraud. How should Sean proceed?

✓ Design a solution that keeps track of dates, times, locations of transactions, and
geolocation of the authorized cell phone. When a user makes a purchase at a store,
the bank can immediately check that the cell phone and the bank card are in the
same place. If they are, the purchase is considered legitimate. But if they are not,
then the payment is rejected.



Kia recently noticed that when she browses her favorite online shopping site,

she is immediately redirected to a competitor's site. What is happening here,

and what is the best option for Kia to fix this situation?

✓ Kia must uninstall the toolbar software and the accompanying components she has
recent installed on her browser.



How can a configuration review reduce the impact of a vulnerability scan on the

network's overall performance?

✓ It ensures the scan is designed to meet its intended goals by defining scope and
sensitivity levels.



A company has approached you for their product testing, and you agree to do it.

First, you have to install the necessary plugins for the software through the

browser, install the software, and run the software again.




Examify | Smart Grades | Latest update

,#Examify | #OnlineExams | #TestPrep | #StudyResources | #AcademicSuccess |
#ExamPreparation | #QuizTime | #LearningTools | #Education | #StudentSupport

✓ Making sure that the OS's security options are deployed, run the
antivirus/antispyware on the files downloaded, run the software on HSTS/HTTPS
mode, and then send a secure cookie to the server.



Alpha Tech started a charitable competition in which every team is asked to

submit a proposal for a public health contract asking for a new viral

transmission mitigation app.

✓ Team B has selected BAN.



Which of the following uses hardware encryption technology to secure stored

data and ensures the inseparability of SEDs among vendors?

✓ Opal



Amaya is looking for a hardware chip or integrated circuit (IC) that can be

programmed by the user to carry out one or more logical operations, can be

reprogrammed when needed, and can be configured by either the user or

designer. Which option should Amaya select?

✓ Field-programmable gate array (FPGA)



Under which of the following modes does the ciphertext depend only on the

plaintext and the key, independent of the previous ciphertext blocks?

✓ ECB



Which penetration testing consultants are not given any knowledge of the

network nor any elevated privileges?


Examify | Smart Grades | Latest update

,#Examify | #OnlineExams | #TestPrep | #StudyResources | #AcademicSuccess |
#ExamPreparation | #QuizTime | #LearningTools | #Education | #StudentSupport

✓ Black box



Your company is considering updating several electronic devices used in the

enterprise network. The third-party service provider that your company

approached says that they require access to the enterprise network in order to

implement the updates. As the chief information security officer, you are asked

to analyze the requirement and submit a report on potential vulnerabilities

when giving a third-party access to the network.

Which of the following vulnerabilities should you list as the most likely to affect

the enterprise network?

✓ Weakest link



Threat actors focused on financial gain often attack which of the following main

target categories?

✓ Individual users



Which of the following is a physical social engineering technique?

✓ Dumpster diving



A vulnerability assessment engineer performed vulnerability scanning on active

directory servers and discovered that the active directory server is using a lower

version of Kerberos. To alert management to the risk behind using a lower

version of Kerberos, he needs to explain what an attacker can do to leverage the




Examify | Smart Grades | Latest update

, #Examify | #OnlineExams | #TestPrep | #StudyResources | #AcademicSuccess |
#ExamPreparation | #QuizTime | #LearningTools | #Education | #StudentSupport

vulnerabilities in it. Which of the following actions can the attacker perform

after exploiting vulnerabilities in Kerberos?

✓ Use privilege escalation



Which of the following is considered an industry-specific cybersecurity

regulation?

✓ Health Insurance Portability and Accountability Act of 1996 (HIPAA)



Which of the following is defined as a structure for governing all the elements

involved in digital certificate management?

✓ PKI



Blockchain relies on which cryptographic algorithm to make it computationally

infeasible to try to replace a block or insert a new block of information without

the approval of all entities involved?

✓ Cryptographic hash algorithms



Samira is developing a virtual private chat application for ABC Consulting. The

following are requirements provided by the organization while making the

application:

✓ c. Tunnel mode



Which of the following is the earliest and most general cryptographic protocol?

✓ d. SSL

Examify | Smart Grades | Latest update

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Examify. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79373 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart