We offer free Security+ practice test 9. 1. Which of the following statements about the testing environment is true? A. It is deployed within the organization’s DMZ. B. It is isolated from the development environment C. It is used to test all the installation, configuration, and migration scripts and procedures. D. It is the live environment that runs the application. 2. The IT helpdesk has been getting repeated complaints from the sales team on the field, stating that they are not able to access the company’s intranet through their mobile device. As a result, they are not able to give product demos to the clients they are visiting. The IT helpdesk engineer checks on various systems in the office and confirms that there are no problems with accessing the intranet. What could be the possible reason for this situation to arise? A. Packet sniffing B. Evil Twin C. Jamming D. Rogue AP 3. An organization takes extra care to hide the cryptographic methods that it uses. Which of the following term describes this secrecy? A. Cipher Block Chaining B. Electronic Code Book C. Security through obsecurity D. Perfect forward secrecy 4. Which of the following option is a disadvantage of a block cipher? [Choose two that apply.] A. Error propagation B. Higher diffusion C. Susceptibility to modification D. Encryption speed 5. You have recently installed a new wireless access point. To ensure its security, what is the first task that you must perform right after the installation? A. Enable MAC filtering B. Enable its firewall C. Select a strong encryption protocol D. Change the default admin password 6. You need to implement a new wireless network for a media organization. Most of the users will be working with video streaming. Which of the wireless standard should you select in this scenario? A. 802.11n B. 802.11g C. 802.11a D. 802.11b E. 802.11ac 7. A Web developer has developed a Web application that needs to be debugged. The Web developer needs to capture and find vulnerabilities. The developer also wants to change the requests and responses as they are captured. What should the developer do? A. Configure an interception proxy B. Install and configure a Host Intrusion Detection System on the Web server C. Log all the traffic on the firewall D. Review the Web server logs 8. You have joined as an IT Manager in a newly incorporated insurance firm. Your firm has setup a large datacenter with hundreds of servers and a team to manage it. You have been asked to deploy an insurance application. The application will store customer-sensitive data and needs to be installed in anenvironment that is under your control. What type of deployment should you opt for? A. Managed hosting B. Public Cloud C. Third-party hosting D. On-premises 9. An employee of your departmental store left their phone unattended. The customer they were attending was able to copy several phone numbers and browse personal photographs on the phone. How could this have been prevented? A. Using hidden folders B. Using screen lock C. Using a boot password D. Using device encryption 10. . If you intend to use Trusted Platform Module (TPM) to store the cryptographic keys used to encrypt data, which type of attack are you trying to prevent? A. Certificate cracking B. Dictionary C. Brute-force D. DDoS Time is Up! Time's up