30 Questions
What is the primary cause of workstations on the LAN becoming infected with malware?
Awareness training
Which biometric authentication method is based on recognizing the unique pattern of blood vessels in the retina?
Retina
Why are users on the LAN being tricked into clicking on malicious URLs?
No internal controls exist to evaluate URL safety
What makes retina authentication virtually impossible to duplicate or bypass?
Unique pattern of blood vessels
What is the common purpose of a RAT (Remote Access Trojan) when infecting a computer?
Stealthy unauthorized access
What technology should be implemented to educate users about the risks associated with clicking on malicious URLs?
Awareness training
What is the primary concern a company using drones for perimeter monitoring should have?
Privacy
Why has the malware in the scenario evaded detection by traditional antivirus software?
Utilizes polymorphic techniques
Which factor might raise privacy concerns when using drones for perimeter monitoring?
Collecting video and images of individuals
What feature of a worm differentiates it from other types of malware?
Exploits system vulnerabilities to spread autonomously
What security measure can a company using drones implement to address privacy concerns?
Restricting access to telemetry data
How does adding a software application to the whitelist help resolve issues related to security policies blocking its execution?
Allows the program to run without any restrictions
What is the primary role of the white team during a penetration testing exercise?
Providing oversight and support
Which team determines the rules and guidelines of a penetration testing exercise?
Purple team
What type of document did Ann receive from her mortgage company regarding sharing her PII?
Annual privacy notice
In a penetration testing exercise, which team is responsible for monitoring the progress of the teams?
Green team
What is the main purpose of an annual privacy notice from a financial institution?
Outlining the institution's privacy policy
Which team in a penetration testing exercise is responsible for providing feedback on security measures?
Green team
What is the primary concern the stakeholders have with the guest wireless network?
Minimizing disruptions during meetings
Which aspect of the WAPs' configuration helps in restricting access to only the conference rooms?
Decreased power levels and antenna coverage
How does configuring the guest wireless network on a separate VLAN protect the company's internal network?
It isolates guest traffic from company resources
What security measure would be least effective in preventing visitors from accessing company resources?
Decreasing the power levels of access points
Which action would be most appropriate if the company wanted to enhance security further without hindering visitor access?
Employing intrusion detection systems on the guest network
What additional step could be taken to ensure that the guest wireless network remains isolated from the company's internal resources?
'Regular penetration testing on the guest network
What is the main purpose of hacktivists using cyberattacks?
To disrupt services and expose information
Which term describes a sovereign state with a centralized government and defined territory?
Nation-state
Who are nation-state actors?
Individuals or groups conducting cyberattacks on behalf of a nation-state
What are some reasons nation-state actors may target others?
For espionage, sabotage, influence, or retaliation
What does SIEM stand for?
Security Information and Event Management
How does SIEM help in cybersecurity?
By providing real-time monitoring and alerting of security events
Prepare for the CompTIA Security+ Exam with SY0-701 dumps provided by Certshared. Access exam guides and ensure guaranteed success. Learn about setting up a guest wireless network for visitors to access the Internet.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free