Security+ 701 PBQ 18
Quiz Summary
0 of 4 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 4 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 4
1. Question
Your organization has multiple subnets and internal mail servers. You need to configure routing rules to ensure traffic is properly directed. Your network diagram shows the following:
Configure the firewall to route traffic from Subnet B to the Internal Mail Server.
CorrectIncorrect -
Question 2 of 4
2. Question
Your company’s executive is requesting an evaluation of current security controls and recommendations for new implementations. Identify and categorize the following security controls as Preventative, Detective, Corrective, or Directive.
Sort elements
- Preventative
- Detective
- Corrective
- Directive
-
Installing a firewall
-
Setting up an intrusion detection system (IDS)
-
Implementing regular data backups
-
Using security awareness training for employees
CorrectIncorrect -
Question 3 of 4
3. Question
You need to configure password policies using the Windows Registry to enhance security. In case you are unfamiliar with Windows Registry, here is a screenshot:
Current Registry Settings:
- MinimumPasswordLength: 10
- PasswordComplexity: 0
- MaximumPasswordAge: 120
Modify the following registry settings to enforce a strong password policy.
-
MinimumPasswordLength: Set to
PasswordComplexity: Set to
MaximumPasswordAge: Set to
CorrectIncorrect -
Question 4 of 4
4. Question
Your company’s executive has sent an email requesting an evaluation of current security controls and recommendations for new implementations.
Email from CEO:
Subject: Security Breaches Concern
Team,
We’ve had several security breaches recently. I need a detailed plan outlining our current security controls and recommendations for improvement. Focus on preventative, detective, corrective, compensating, directive, and deterrent controls.
Thanks,
CEOEmail from IT Manager:
Subject: RE: Security Breaches Concern
CEO,
Below are the current controls:
– Firewall (Preventative)
– IDS (Detective)
– Data Backups (Corrective)
– Training Programs (Directive)We recommend adding:
– Multi-factor Authentication (Preventative)
– Security Information and Event Management (SIEM) (Detective)
– Incident Response Plan (Corrective)
– Virtual Private Network (VPN) (Compensating)
– Security Signage (Deterrent)Regards,
IT ManagerIdentify and categorize the following security controls based on the email chain.
Sort elements
- Enhances security by requiring multiple forms of verification.
- Monitors and analyzes security events.
- Provides a strategy for addressing and managing security incidents.
- Provides additional security for remote access.
- Discourages potential attackers by visibly indicating security measures.
-
Preventative
-
Detective
-
Corrective
-
Compensating
-
Deterrent
CorrectIncorrect