Mid MCQ
Mid MCQ
Mid MCQ
Review Questions
1. After Bella earned her security certification, she c. Security is less important than convenience.
was offered a promotion. As she reviewed the job d. Security and convenience are equal in importance.
responsibilities, she saw that in this position she 4. Which of the following of the CIA Triad ensures that
will report to the CISO and supervise a group of information is correct, and no unauthorized person
security technicians. Which of these generally has altered it?
recognized security positions has she been offered? a. Confidentiality
a. Security administrator b. Integrity
b. Security technician c. Availability
c. Security officer d. Assurance
d. Security manager
5. Which of the following is not used to describe those
2. Which of the following is false about the CompTIA who attack computer systems?
Security1 certification? a. Threat actor
a. Security1 is one of the most widely acclaimed b. Hacker
security certifications. c. Malicious agent
b. Security1 is internationally recognized as validating d. Attacker
a foundation level of security skills and knowledge.
c. The Security1 certification is a vendor-neutral 6. Which of the following is not true regarding security?
credential. a. Security is a goal.
d. Professionals who hold the Security1 certification b. Security includes the necessary steps to protect
earn about the same or slightly less than security from harm.
professionals who have not achieved this c. Security is a process.
certification. d. Security is a war that must be won at all costs.
3. Which of the following is true regarding the 7. Luna is reading a book about the history
relationship between security and convenience? of cybercrime. She read that the very first
a. Security and convenience are inversely cyberattacks were mainly for what purpose?
proportional. a. Fortune
b. Security and convenience have no relationship. b. Fame
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Module 1 Introduction to Security 25
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Module 2 Threat Management and Cybersecurity Resources 57
Review Questions
1. Ebba has received a new initiative for her security 5. What penetration testing level name is given to
team to perform an in-house penetration test. What testers who have no knowledge of the network and
is the first step that Ebba should undertake? no special privileges?
a. Approval a. Black box
b. Budgeting b. Gray box
c. Planning c. White box
d. Documentation d. Purple box
2. Which of the following is NOT a characteristic of a 6. Which of the following is NOT an advantage of
penetration test? crowdsourced penetration testing?
a. Automated a. Faster testing
b. Finds deep vulnerabilities b. Less expensive
c. Performed occasionally c. Ability to rotate teams
d. May use internal employees or external consultants d. Conducting multiple tests simultaneously
3. Linnea has requested to be placed on the 7. Tilde is working on a contract with the external
penetration testing team that scans for penetration testing consultants. She does not
vulnerabilities to exploit them. Which team does want any executives to receive spear-phishing
she want to be placed on? emails. Which rule of engagement would cover this
a. Blue Team limitation?
b. Purple Team a. Scope
c. White Team b. Exploitation
d. Red Team c. Targets
4. Lykke’s supervisor is evaluating whether to d. Limitations and exclusions
use internal security employees to conduct a
8. Which is the final rule of engagement that would be
penetration test. Lykke does not consider this a
conducted in a pen test?
good idea and has created a memo with several
a. Cleanup
reasons they should not be used. Which of the
b. Communication
following would NOT be part of that memo?
c. Reporting
a. The employees could have inside knowledge of the
d. Exploitation
network that would give them an advantage.
b. There may be a lack of expertise. 9. What is another name for footprinting?
c. Employees may have a reluctance to reveal a a. High-level reconnaissance
vulnerability. b. Active reconnaissance
d. They would have to stay overnight to perform the c. Modeling
test. d. Revealing
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
58 COMPTIA Security+ Guide to Network Security Fundamentals
10. When researching how an attack recently took 15. Which group is responsible for the Cloud Controls
place, Nova discovered that the threat actor, after Matrix?
penetrating the system, started looking to move a. CSA
through the network with their elevated position. b. CIS
What is the name of this technique? c. OSINT
a. Jumping d. NIST
b. Twirling 16. Tuva’s supervisor wants to share a recent audit
c. Squaring up outside the organization. Tuva warns him that this
d. Lateral movement type of audit can only be read by those within the
11. What are documents that are authored by organization. What audit does Tuva’s supervisor
technology bodies employing specialists, want to distribute?
engineers, and scientists who are experts in those a. SSAE SOC 2 Type II
areas? b. SSAE SOC 2 Type III
a. Cybersecurity feeds c. SSAE SOC 3 Type IV
b. White notebooks d. SSAE SOC 3.2 Type X
c. Blue papers 17. Which ISO contains controls for managing and
d. Requests for comments (RFCs) controlling risk?
12. Which of the following is not a general information a. ISO XRS
source that can provide valuable in-depth b. ISO 31000
information on cybersecurity? c. ISO 271101
a. Twitter d. ISO 27555
b. Conferences 18. Which premise is the foundation of threat hunting?
c. Local industry groups a. Cybercrime will only increase.
d. Vendor websites b. Threat actors have already infiltrated our network.
13. Which of the following is a standard for the c. Attacks are becoming more difficult.
handling of customer card information? d. Pivoting is more difficult to detect than ever before.
a. DRD STR 19. Which of the following can automate an incident
b. OSS XRS response?
c. RMR CDC a. SIEM
d. PCI DSS b. SOAR
14. Which of the following are developed by c. CVCC
established professional organizations or d. SOSIA
government agencies using the expertise of 20. Which of the following is NOT something that a
seasoned security professionals? SIEM can perform?
a. Legislation a. User behavior analysis
b. White papers b. Sentiment analysis
c. Regulations c. Log aggregation
d. Benchmarks d. Incident response
Hands-On Projects
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
88 COMPTIA Security+ Guide to Network Security Fundamentals
Key Terms
adversarial artificial intelligence fileless virus replay
application program interface (API) improper input handling resource exhaustion attacks
attack injections rootkit
backdoor integer overflow attack security of the ML algorithms
bot keylogger server-side request forgery (SSRF)
buffer overflow attack logic bomb shimming
client-side request forgery malware spyware
command and control (C&C) memory leak SQL injection
cross-site request forgery (CSRF) pointer/object dereference Structured Query Language
cross-site scripting (XSS) potentially unwanted programs tainted training data for machine
cryptomalware (PUPs) learning
device driver manipulation race condition time of check/time of use
DLL injection ransomware Trojan
error handling refactoring worm
eXtensible Markup Language (XML) remote access Trojan XML injection
Review Questions
1. What word is the currently accepted term to refer b. Cryptomalware can encrypt all files on any network
to network-connected hardware devices? that is connected to the employee’s computer.
a. Host c. The organization may be forced to pay up to $500
b. Endpoint for the ransom.
c. Device d. The employee would have to wait at least an hour
d. Client before her computer could be restored.
2. Which of the following is NOT a characteristic of 5. Which type of malware relies on LOLBins?
malware? a. PUP
a. Deceive b. File-based virus
b. Launch c. Fileless virus
c. Imprison d. Bot
d. Diffusion 6. Which of the following is known as a network virus?
3. Gabriel’s sister called him about a message a. TAR
that suddenly appeared on her screen that says b. Worm
her software license has expired and she must c. Remote exploitation virus (REV)
immediately pay $500 to have it renewed before d. C&C
control of the computer will be returned to her. 7. Josh is researching the different types of attacks
What type of malware has infected her computer? that can be generated through a botnet. Which of
a. Persistent lockware the following would NOT be something distributed
b. Blocking ransomware by a botnet?
c. Cryptomalware a. LOLBins
d. Impede-ware b. Spam
4. Marius’s team leader has just texted him that c. Malware
an employee, who violated company policy by d. Ad fraud
bringing in a file on her USB flash drive, has just 8. Which of the following is NOT a means by which a
reported that her computer is suddenly locked up bot communicates with a C&C device?
with cryptomalware. Why would Marius consider a. Signing in to a website the bot herder operates
this a dangerous situation? b. Signing in to a third-party website
a. It sets a precedent by encouraging other employees c. Email
to violate company policy. d. Command sent through Twitter posts
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Module 3 Threats and Attacks on Endpoints 89
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
120 COMPTIA Security+ Guide to Network Security Fundamentals
Key Terms
antimalware disabling unnecessary open ports provisioning
antivirus (AV) and services public information sharing centers
application whitelisting/ dynamic code analysis quality assurance (QA)
blacklisting elasticity quarantine
automated courses of action endpoint detection and response registry
Automated Indicator Sharing (EDR) sandbox
(AIS) file and code repositories scalability
auto-update fuzzing secure coding practices and
binary hardware root of trust techniques
blacklisting host intrusion detection system secure cookie
boot attestation (HIDS) server-side execution and
client-side execution and host intrusion prevention system validation
validation (HIPS) software diversity
closed source HTTP Response Headers staging stage
code reuse of third-party libraries indicator of compromise (IOC) static code analysis
and SDKs integrity measurement stored procedure
code signing manual peer reviews Structured Threat Information
compilers Measured Boot Expression (STIX)
continuous delivery memory management testing stage
continuous deployment normalization third-party updates
continuous integration obfuscation/camouflaged code threat map
continuous monitoring open source Trusted Automated Exchange
continuous validation OWASP (Open Web Application of Intelligence Information
dark web Security Project) (TAXII)
data exposure predictive analysis UEFI (Unified Extensible Firmware
dead code private information sharing Interface)
deprovisioning centers version control
development stage production stage vulnerability database
directory traversal proper input validation whitelisting
Review Questions
1. An IOC occurs when what metric exceeds its c. TLP
normal bounds? d. PCII
a. IRR 4. Oskar has been receiving emails about critical
b. LRG threat intelligence information from a public
c. EXR information sharing center. His team leader has
d. KRI asked him to look into how the process can
2. What are the two concerns about using public be automated so that the information can feed
information sharing centers? directly into the team’s technology security. What
a. Cost and availability technology will Oskar recommend?
b. Privacy and speed a. Automated Indicator Sharing (AIS)
c. Security and privacy b. Bidirectional Security Protocol (BSP)
d. Regulatory approval and sharing c. Linefeed Access
3. Which privacy protection uses four colors d. Lightwire JSON Control
to indicate the expected sharing limitations 5. Which of the following is an application protocol
that are to be applied by recipients of the for exchanging cyberthreat intelligence over
information? HTTPS?
a. CISA a. STIX
b. FOIA b. AIP-TAR
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Module 4 Endpoint and Application Development Security 121
c. TAXII 12. Which stage conducts a test that will verify the
d. TCP-Over-Secure (ToP) code functions as intended?
a. Production stage
6. What are the two limitations of private information
b. Testing stage
sharing centers?
c. Staging stage
a. Access to data and participation
d. Development stage
b. Government approval and cost
c. Timing of reports and remote access 13. Which model uses a sequential design process?
d. Bandwidth and CPU a. Secure model
b. Agile model
7. Which of the following is NOT a limitation of a
c. Rigid model
threat map?
d. Waterfall model
a. Many maps claim that they show data in real
time, but most are simply a playback of previous 14. Which of the following is NOT an advantage of an
attacks. automated patch update service?
b. Because threat maps show anonymized data, it is a. Downloading patches from a local server instead of
impossible to know the identity of the attackers or using the vendor’s online update service can save
the victims. bandwidth and time because each computer does
c. They can be difficult to visualize. not have to connect to an external server.
d. Threat actors usually mask their real locations, so b. Administrators can approve updates for “detection”
what is displayed on a threat map is incorrect. only; this allows them to see which computers
8. Luka has been asked by his supervisor to monitor require the update without installing it.
the dark web for any IOCs concerning their c. Users can disable or circumvent updates just as
organization. The next week, Luca reports that they can if their computer is configured to use the
he was unable to find anything because looking vendor’s online update service.
for information on the dark web is different from d. Administrators can approve or decline updates for
using the regular web. Which of the following is client systems, force updates to install by a specific
FALSE about looking for information on the dark date, and obtain reports on what updates each
web? computer needs.
a. It is necessary to use Tor or IP2. 15. What type of analysis is heuristic monitoring based on?
b. Dark web search engines are identical to regular a. Dynamic analysis
search engines. b. Static analysis
c. Dark web merchants open and close their sites c. Code analysis
without warning. d. Input analysis
d. The naming structure is different on the dark web. 16. Which of these is a list of preapproved
9. Which of the following is NOT an improvement of applications?
UEFI over BIOS? a. Greenlist
a. Stronger boot security b. Redlist
b. Networking functionality in UEFI c. Blacklist
c. Access larger hard drives d. Whitelist
d. Support of USB 3.0 17. What is the advantage of a secure cookie?
10. Which boot security mode sends information on a. It cannot be stored on the local computer without
the boot process to a remote server? the user’s express permission.
a. UEFI Native Mode b. It is sent to the server over HTTPS.
b. Secure Boot c. It is analyzed by AV before it is transmitted.
c. Trusted Boot d. It only exists in RAM and is deleted once the web
d. Measured Boot browser is closed.
11. Which of the following is NOT an important OS 18. Which of the following tries to detect and stop an
security configuration? attack?
a. Employing least functionality a. HIDS
b. Disabling default accounts b. HIPS
c. Disabling unnecessary services c. RDE
d. Restricting patch management d. SOMA
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
122 COMPTIA Security+ Guide to Network Security Fundamentals
19. What does Windows 10 Tamper Protection 20. Which of the following is FALSE about a quarantine
do? process?
a. Limits access to the registry. a. It holds a suspicious application until the user gives
b. Prevents any updates to the registry until the approval.
user approves the update. b. It can send a sanitized version of the attachment.
c. Compresses and locks the registry. c. It can send a URL to the document that is on a
d. Creates a secure backup copy of the restricted computer.
registry. d. It is most often used with email attachments.
Hands-On Projects
If you are concerned about installing any of the software in these projects on your regular
Caution computer, you can instead install the software in the Windows in the Microsoft Sandbox or
a virtual machine created in the Module 1 Hands-On Projects. Software installed within the
virtual machine will not impact the host computer.
1. Open your web browser and enter the URL portal.msrc.microsoft.com/en-us/. (The location of content on the
Internet may change without warning. If you are no longer able to access the program through this URL, use a
search engine to search for “Microsoft Security Response Center.”)
2. Click Read the Security Update Guide FAQ.
3. Click Expand all to read through the information.
4. Click the link www.icasi.org/cvrf/ (or enter it into another tab in your browser). What is the Common
Vulnerability Reporting Framework (CVRF)? How is it used?
5. Return to the Microsoft Security Update Guide and then the MSRC main page.
6. Click the Go to the Security Update Guide button.
7. If no security updates appear, adjust the From date to the first day of the previous month.
8. Scroll through the list of security updates.
9. Click the first link under Article.
10. Read through this information.
11. Now return to the previous page and select another article to read.
12. How useful is this information? Is it presented in a format that is helpful?
13. Now click the CVE link under Details and read this information. Note the detail of this information.
14. Read the information under Exploitability Assessment (if the exploit you selected does not list an Exploitability
Assessment, then select another that does include the assessment). What does this mean? Open another tab on
your web browser, and search for Microsoft Exploitability Index. Read through the description that you find
and keep this tab open.
15. Return to the Microsoft Security Update Guide and view the Exploitability Assessment. How serious is this
security vulnerability?
16. How important is this information to a security professional? How easy is this online database to use?
17. Now compare the Microsoft database with Apple’s. Enter the URL support.apple.com/en-us/HT201222. (The
location of content on the Internet may change without warning. If you are no longer able to access the program
through the above URL, use a search engine to search for “Apple Security Updates.”)
18. Scroll down through the list of Apple security updates. How does this list compare with the updates from Microsoft?
19. Select a recent event under Name and information link.
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
148 COMPTIA Security+ Guide to Network Security Fundamentals
Review Questions
1. Akira is explaining to his team members the themselves from competitors if all versions
security constraints that have made it a challenge of Android start to look the same through
for protecting a new embedded system. Which updates.
of the following would Akira NOT include as a b. Because many of the OEMs have modified Android,
constraint? they are reluctant to distribute updates that could
a. Authentication potentially conflict with their changes.
b. Cost c. Wireless carriers are reluctant to provide firmware
c. Power OTA updates because of the bandwidth the updates
d. Availability consume on their wireless networks.
2. Agape has been asked to experiment with different d. Because OEMs want to sell as many devices as
hardware to create a controller for a new device possible, they have no financial incentive to update
on the factory floor. She needs a credit-card-sized mobile devices that users would then continue to
motherboard that has a microcontroller instead of a use indefinitely.
microprocessor. Which would be the best solution? 6. What is the process of identifying the geographical
a. Arduino location of a mobile device?
b. Raspberry Pi a. Geotracking
c. SoC b. Geolocation
d. FPGA c. GeoID
3. Hakaku needs a tool with a single management d. Geomonitoring
interface that provides capabilities for managing 7. Which of these is used to send SMS text messages
and securing mobile devices, applications, and to selected users or groups of users?
content. Which tool would be the best solution? a. Pull notification services
a. MCCM b. Replay notification distribution (RND)
b. MDM c. Push notification services
c. UEM d. MAM mass SMS
d. MMAM 8. Enki received a request by a technician for a new
4. In her job interview, Xiu asks about the company subnotebook computer. The technician noted that
policy regarding smartphones. She is told that he wanted USB OTG support and asked Enki’s
employees may choose from a limited list of advice regarding it. Which of the following would
approved devices but that she must pay for Enki NOT tell him?
the device herself; however, the company will a. A device connected via USB OTG can function as a
provide her with a monthly stipend. Which type of peripheral for external media access.
enterprise deployment model does this company b. A device connected via USB OTG can function as
support? a host.
a. CYOD c. USB OTG is only available for connecting Android
b. COPE devices to a subnotebook.
c. BYOD d. Connecting a mobile device to an infected
d. Corporate owned computer using USB OTG could allow malware to
5. Aoi has been asked to provide research regarding be sent to that device.
adding a new class of Android smartphones to a list 9. Banko’s sister has just downloaded and installed
of approved devices. One of the considerations is an app that allows her to circumvent the built-in
how frequently the smartphones receive firmware limitations on her Android smartphone. What is
OTA updates. Which of the following reasons this called?
would Aoi NOT list in her report as a factor in the a. Rooting
frequency of Android firmware OTA updates? b. Sideloading
a. OEMs are hesitant to distribute Google updates c. Jailbreaking
because it limits their ability to differentiate d. Ducking
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Module 5 Mobile, Embedded, and Specialized Device Security 149
10. Which of the following technologies can convert a 15. Which of these is NOT a security feature for
texting app into a live chat platform? locating a lost or stolen mobile device?
a. MMS a. Remote lockout
b. QR b. Last known good configuration
c. SMS c. Alarm
d. RCS d. Thief picture
11. What prevents a mobile device from being 16. What enforces the location in which an app can
used until the user enters the correct function by tracking the location of the mobile
passcode? device?
a. Swipe identifier (SW-ID) a. Location resource management
b. Screen lock b. Geofencing
c. Screen timeout c. GPS tagging
d. Touch swipe d. Graphical Management Tracking (GMT)
12. Hisoka is creating a summary document for 17. Which of these is considered the strongest type of
new employees about their options for different passcode to use on a mobile device?
mobile devices. One part of his report covers a. Password
encryption. What would Hisoka NOT include in b. PIN
his document? c. Fingerprint swipe
a. All modern versions of mobile device OS encrypt d. Draw connecting dots pattern
all user data by default. 18. Which of the following is NOT a context-aware
b. Encryption occurs when the mobile device is authentication?
locked. a. On-body detection
c. Apple uses file-based encryption to offer a higher b. Trusted places
level of security. c. Trusted devices
d. Data backed up to an Apple or Google server could d. Trusted contacts
be unlocked by a court order.
19. Which tool manages the distribution and control of
13. What does containerization do? apps?
a. It splits operating system functions only on specific a. MAM
brands of mobile devices. b. MDM
b. It places all keys in a special vault. c. MCM
c. It slows down a mobile device to half speed. d. MFM
d. It separates personal data from corporate data.
20. Which type of OS is typically found on an
14. What allows a device to be managed remotely? embedded system?
a. Mobile device management (MDM) a. SoC
b. Mobile application management (MAM) b. RTOS
c. Mobile resource management (MRM) c. OTG
d. Mobile wrapper management (MWM) d. COPE
Hands-On Projects
If you are concerned about installing any of the software in these projects on your regular
Caution computer, you can instead use the Windows Sandbox or install the software in the Windows
virtual machine created in the Module 1 Hands-On Projects. Software installed within the
virtual machine will not impact the host computer.
Copyright 2022 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.