100% Free Exams (No login or credit card required)

0%

Section 5.6

Demonstrate your acquired knowledge about implementing security awareness practices. This will demonstrate your proficiency for section 5.6 of the Security+ SY0-701 objectives.

1 / 25

1) Which is most likely to improve detection of anomalous insider behavior?

2 / 25

2) Which action should follow the development of a new security awareness module?

3 / 25

3) What component supports accountability for user actions in awareness programs?

4 / 25

4) During training, users are shown a fake email from HR asking for tax info. What is being tested?

5 / 25

5) A user repeatedly sends files to personal email for convenience. What should be emphasized?

6 / 25

6) Which of the following best defines "operational security"?

7 / 25

7) What factor most affects the success of security awareness development?

8 / 25

8) A phishing email mimics a senior executive. What kind of attack is this?

9 / 25

9) Why is recurring training more effective than one-time training?

10 / 25

10) Security awareness in remote environments should include:

11 / 25

11) An employee plugs a personal charger into their work laptop, which begins behaving oddly. What risk was introduced?

12 / 25

12) What term describes sending fake emails to test staff susceptibility to phishing?

13 / 25

13) What should a security awareness program prioritize to reduce accidental insider risks?

14 / 25

14) Which is the most effective method for tracking security awareness program progress?

15 / 25

15) A USB device was found plugged into a secure server. What policy was most likely violated?

16 / 25

16) Which document usually outlines organizational expectations for security behavior?

17 / 25

17) What scenario would require heightened situational awareness training?

18 / 25

18) What should be a recurring focus of password training?

19 / 25

19) What security issue is most relevant in hybrid work environments?

20 / 25

20) A newly hired contractor asks a colleague to share login credentials. What is this an example of?

21 / 25

21) What is the most effective first response to a reported phishing email?

22 / 25

22) Which behavior is most likely to indicate an insider threat?

23 / 25

23) Which of the following best improves employee response to phishing attempts?

24 / 25

24) A company notices that an intern downloaded gigabytes of internal documents to a USB drive. What kind of behavior is this?

25 / 25

25) An employee receives an email urging immediate action to reset their password. The URL appears legitimate but points to an unfamiliar domain. What is this an example of?

Your score is

The average score is 0%

0%