We offer free Security+ practice test 1 . 1. Your organization has assigned you a mobile device. The organization controls the device, along with its applications and data. Which type of device have you been assigned? A. BYOD B. CYOD C. COPE D. COBO 2. A user downloaded and installed an application on the computer. During installation, the application prompted the user to confirm if changes can be made to the configuration settings. The users confirmed, and the installation is completed. However, after the installation, the computer’s performance was degraded. Some internal tasks were being performed which the user did not initiate. The user intimates the system administrator about the issue. The system administratorchecks the computer and identifies that some malicious code has been installed on thecomputer. What should the administrator do? A. Revert to the last known state B. Uninstall the new application C. Reconfigure the operating system D. Reboot the computer 3. An unauthorized user attempted to authenticate himself with the fingerprint scanner and got authenticated. Which of the following has just occurred? A. False rejection rate B. False acceptance rate C. True acceptance rate D.. Crossover rate 4. A banking web application employs an encryption algorithm using a key size less than 128 bits. Which of the following vulnerabilities might bug the application? Weak cipher suite B. System sprawl C. Weak configuration D. Design weaknesses 5. Which of the following example depicts a transitive trust? A. Domain A trusts Domain B, Domain B trusts Domain C, Domain A trusts Domain C B. Domain A trusts Domain B, Domain C trusts Domain A, Domain C trusts Domain B C. Domain A trusts Domain B, Domain B trusts Domain C, Domain C trusts Domain A D. Domain A trusts Domain B, Domain B trusts Domain A 6. You have an e-commerce application that needs to be implemented. Implementing the application includes allowing access to external users on the Internet. You want to ensure the application is protected from cross-site scripting (XSS) and SQL injection. You also want to prevent OSI Layer 7 traffic. To meet the criteria in the scenario, which of the following should you implement along with the application? A. Application Firewall B. Network Intrusion Detection System (NIDS) C. Network Firewall D. URL filtering 7. You have just implemented Mobile Device Management (MDM) to manage mobile devices. You have been asked to implement a method so that each mobile device separates the organization’s applications and data from the employee’s applications and data. How should you achieve this? A. Encrypt the organization’s applications and data B. Configure containerization on each mobile device C. Enable Guest login for each user on their mobile device D. Create separate folders for the organization’s applications and data 8. The users in your organization use a thin client to connect to their respective desktop environments. The users can use the desktop environment from their laptops and mobile phones. What has been configured for the users? HTTPS SSH Telnet VDI 9. While collecting evidence for digital forensics, which of the following is the volatile evidence that must be given first priority? A.. Recovering data from the network logs B. Recovering data from the Compact Disc C. Recovering data from backups D. Recovering videos from Closed Circuit Television 10. As an HR Manager, you hold everyone’s personal information along with their social security numbers. What does the social security number classify to be? A. Public B. Private C. Confidential D. Proprietary Time is Up! Time's up