0% Section 5.6 Demonstrate your acquired knowledge about implementing security awareness practices. This will demonstrate your proficiency for section 5.6 of the Security+ SY0-701 objectives. 1 / 25 1) Which is most likely to improve detection of anomalous insider behavior? Scheduled patching Policy acceptance Behavior baselining Least privilege 2 / 25 2) Which action should follow the development of a new security awareness module? Role reassignment Risk acceptance Employee onboarding Training execution 3 / 25 3) What component supports accountability for user actions in awareness programs? File hash logs Audit trail reviews IP block lists MAC filtering 4 / 25 4) During training, users are shown a fake email from HR asking for tax info. What is being tested? Token usage Credential hygiene Policy alignment Phishing response 5 / 25 5) A user repeatedly sends files to personal email for convenience. What should be emphasized? Network isolation Software patching Data classification Credential rotation 6 / 25 6) Which of the following best defines "operational security"? Threat modeling Incident simulation Risk-based access Protecting workflows 7 / 25 7) What factor most affects the success of security awareness development? Network type Target audience Cable bandwidth Host platform 8 / 25 8) A phishing email mimics a senior executive. What kind of attack is this? Whale phishing Packet spoofing Session replay Domain hijack 9 / 25 9) Why is recurring training more effective than one-time training? Improves SLA compliance Reinforces secure behavior Reduces licensing costs Supports code reusability 10 / 25 10) Security awareness in remote environments should include: RAID configuration Cable shielding VPN usage rules Backup frequency 11 / 25 11) An employee plugs a personal charger into their work laptop, which begins behaving oddly. What risk was introduced? Rootkit injection Drive-by exploit USB-based threat Logic bomb 12 / 25 12) What term describes sending fake emails to test staff susceptibility to phishing? Pen testing Awareness drill Phishing simulation Incident rehearsal 13 / 25 13) What should a security awareness program prioritize to reduce accidental insider risks? Malware scans User profiling Behavioral education Port scanning 14 / 25 14) Which is the most effective method for tracking security awareness program progress? Logon script review Certificate renewal User surveys Training completion 15 / 25 15) A USB device was found plugged into a secure server. What policy was most likely violated? Credential policy Removable media Encryption baseline Email filtering 16 / 25 16) Which document usually outlines organizational expectations for security behavior? Ticket log Access matrix Security policy Audit checklist 17 / 25 17) What scenario would require heightened situational awareness training? Connecting to the intranet Using company email Handling sensitive data Resetting local accounts 18 / 25 18) What should be a recurring focus of password training? Directory permissions MFA key reuse Rotation frequency Password vault use 19 / 25 19) What security issue is most relevant in hybrid work environments? Device hardening Network propagation Remote access misuse RAID misconfiguration 20 / 25 20) A newly hired contractor asks a colleague to share login credentials. What is this an example of? Zero trust bypass Role mismatch Social engineering Credential rotation 21 / 25 21) What is the most effective first response to a reported phishing email? Delete the message Alert the sender Notify IT/security team Forward to coworkers 22 / 25 22) Which behavior is most likely to indicate an insider threat? Sudden VPN disconnections After-hours data access Failed login attempts Cloud sync errors 23 / 25 23) Which of the following best improves employee response to phishing attempts? Security patching Network segmentation Ongoing training Access provisioning 24 / 25 24) A company notices that an intern downloaded gigabytes of internal documents to a USB drive. What kind of behavior is this? Expected usage Insider negligence Risky behavior Device profiling 25 / 25 25) An employee receives an email urging immediate action to reset their password. The URL appears legitimate but points to an unfamiliar domain. What is this an example of? Credential stuffing Spear phishing Clickjacking attack DNS rebinding Your score isThe average score is 0% 0% Restart quiz Return to CompTia S+ SY0-701 Objectives