Security+_Chapter 3 focus
Security+_Chapter 3 focus
options, correct answers, and the corresponding chapters and topics from Darrel
Gibson's book.
C. Denial of Service
D. Malware infection
12. **Which of the following is a common method for protecting sensitive data?**
A. Encryption
B. Deletion
C. Compression
D. Sharing
36. **Which of the following is an effective way to prevent SQL injection attacks?**
A. Using input validation
B. Allowing all inputs
C. Ignoring error messages
D. Using default database settings
77. **Which of the following best describes an advanced persistent threat (APT)?**
A. A short-lived attack
B. A targeted and sophisticated attack
C. A random malware infection
D. A harmless vulnerability
94. **What is the function of a Security Information and Event Management (SIEM)
system?**
A. To monitor network traffic
B. To analyze security data and alerts
C. To conduct penetration testing
D. To encrypt sensitive data
99. **Which of the following is a common method for securing data in transit?**
A. Using encryption protocols
B. Using plain text
C. Using outdated software
D. Using weak passwords
Here’s a complete set of 100 Security+ questions and answers, including answer
options, correct answers, and the corresponding chapters and topics from Darrel
Gibson's book.
15. **Which of the following attacks involves overwhelming a network with traffic?**
A. Spoofing
B. DDoS
C. Man-in-the-middle
D. Phishing
**Answer:** B. DDoS
**Chapter:** Chapter 3
**Topic:** Network Attacks
36. **Which of the following is an effective way to prevent SQL injection attacks?**
A. Using input validation
B. Allowing all inputs
C. Ignoring error messages
D. Using default database settings
**Answer:** A. Using input validation
**Chapter:** Chapter 3
**Topic:** Application Security
77. **Which of the following best describes an advanced persistent threat (APT)?**
A. A short-lived attack
B. A targeted and sophisticated attack
C. A random malware infection
D. A harmless vulnerability
**Answer:** B. A targeted and sophisticated attack
**Chapter:** Chapter 3
**Topic:** Threats and Vulnerabilities
78. **What is the purpose of an endpoint protection solution?**
A. To monitor network traffic
B. To protect endpoints from malware and threats
C. To encrypt sensitive data
D. To manage user accounts
**Answer:** B. To protect endpoints from malware and threats
**Chapter:** Chapter 3
**Topic:** Endpoint Security
91. **Which of the following is a common method for preventing data breaches?**
A. Regular software updates
B. User training on security best practices
C. Implementing access controls
D. All of the above
**Answer:** D. All of the above
**Chapter:** Chapter 3
**Topic:** Data Protection
99. **Which of the following is a common method for securing data in transit?**
A. Using encryption protocols
B. Using plain text
C. Using outdated software
D. Using weak passwords
**Answer:** A. Using encryption protocols
**Chapter:** Chapter 3
**Topic:** Data Protection