Can You Pass This Difficult CompTIA Security+ Exam?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 623,913
| Attempts: 66,198 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Backup is required only for electric power and not electronic data. T/F?

Explanation

All precautions for networks are being taken to preserve network and data availability. Hence iti s mandatory that data be given maximum online and offline fault tolerance.

Submit
Please wait...
About This Quiz
Can You Pass This Difficult CompTIA Security+ Exam? - Quiz

This quiz has been made to see whether you are completely prepared for the real exam. This practice test will help you pass by familiarizing you with the... see morematerial and the ensuring that you know the structure of the CompTIA Security+ test. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam. So, let's try out this challenging quiz. All the best!
see less

2. Which of the following firewall policies is most restrictive?

Explanation

The �deny all� is the most restrictive statement that is implicitly defined in the fireall when no other statement is configured. This will get applied to all packets that do not match with the criteria mentioned in the list above the �deny all� statement.

Submit
3. Which of the following services when placed on the edge of the network, will provide security to the entire network?

Explanation

Router is a gateway and antivirus resides on all systems. Firewall is meant to safe guard the network from external attacks.

Submit
4. Which of the following is necessary even after an employee has attended a security awareness program?

Explanation

The security awareness program attended by the employee may provide security awareness up to that date only. Any improvements and up gradation in security awareness there after must reach all the staff in form of bulletins.

Submit
5. Which of the following provide protection to the enterprise premises against attackers? Choose two

Explanation

Burglar alarms and surveillance systems are an integral part of tracking and alerting authorities against intruders and attackers.

Submit
6. If you wish to allow the external users access your Web server you must block port number 110. T/F?

Explanation

If you wish to allow the external users access your Web server you must unblock port number 80.

Submit
7. Which of the following can be termed as brute force attack?

Explanation

When a particular message has been encrypted using random combinations, a person who is capturing this message will have to try all combinations of deciphering possible to expose the original message. This is known as brute force attack.

Submit
8. Which part of the security policies must a user be aware of?

Explanation

It is very essential for every employee/user to know the relevant security policies and the effect of security breach.

Submit
9. Which of the following is NOT a common type of social engineering attack?

Explanation

SQL injection is a code injection technique used to attack data-driven applications. The other options are types of social engineering attacks:

Phishing uses deceptive emails or websites to trick individuals into revealing sensitive information.

Pretexting involves creating a false scenario to gain trust and obtain personal data.

Baiting offers something enticing to lure victims into a trap, like a malicious USB drive.

Submit
10. Cryptography without keys is more secure than cryptography with keys. T/F?

Explanation

Cryptography without keys is not at all secure as the deciphering program will reside on the same media where the data or message is being received. In case of thest, the data can be stolen along with the deciphering program.

Submit
11. Which of the following can affect productivity? Choose two

Explanation

Network resources not being available means the user has to manage with available resource and hence use more time than required to complete a task. Server crashing and no DRP in place means excess of down time and this affecting the work of several employees. Both these situations can hamper productivity.

Submit
12. Does NTFS provide file system security?

Explanation

NTFS supports EFS (Encrypted File System) which allows data stored on a mass storage device to be saved in encrypted format.

Submit
13. Which of the following will allow you to take stock of sensitive data in the organization?

Explanation

By auditing all servers in the network for stored data, you can classify data as sensitive or non-sensitive. Auditing is the best process of taking stock of sensitive data in the network.

Submit
14. Which of the following port numbers is used by SMTP?

Explanation

SMTP service uses port number 25.

Submit
15. Which of the following processes will allow you to ascertain organizational assets?

Explanation

Auditing is an accounting process where in the organization assets and deficits will be accounted for.

Submit
16. Which of the following can be termed as the Denial of Service Attack?

Explanation

DoS is a way of engaging a Web Server continuously in one specific task by outing it on a loop and ensuring it is unable to respond to any further requests.

Submit
17. If you had to implement a foolproof method of establishing a User ID in your organization, which of the following would you choose? Choose the best answer.

Explanation

Biometric will authenticate or establish User ID depending on the physical attribute of the user. For ex: Finger print, hand scan or retina scan. Since these physical attributes are always physically attached to the person, there is no fear of any of these being lost or reaching wrong hands. Hence Biometric is the most secure form of authentication.

Submit
18. When debugging an Operating system, a programmer would make use of a front door. T/F?

Explanation

A programmer makes use of back doors in the program for the purpose of debugging or observing the performance of the program.

Submit
19. Which of the following are encryption systems? Choose two.

Explanation

RC5 and Blowfish are encryption systems. MAC is a type of hardware address. ARP is a protocol that resolves MAC address to IP address.

Submit
20. It is ideal that a network supports a specific encryption standard only. T/F?

Explanation

Supporting only a specific encryption standard will make that network a closed network and will make it impossible to communicate with networks that follow flexibility in encryption.

Submit
21. Which of the following statements about a Modem are true? Choose two.

Explanation

As the name suggests the modem mainly modulates and demodulates signals. Seated (logically) between the telephone line and the PC, it is responsible for converting the analog signals of the telephone to the digital signals required by the PC and vice versa.

Submit
22. An authorized update is one way of securing the DNS server. T/F?

Explanation

Authorizing the sender of the update and then checking for verification purpose is one way of securing the DNS server database and service availability.

Submit
23. Which of the following is true about Public/Private key pairs? Choose two.

Explanation

They forma an essential part of Web site security system, as it is the most convenient security system for Web sites considering that clients would be accessing the Web site over the public network. The Certificate security system uses the basic logic of Public/Private key pairs.

Submit
24. The concept of public key cryptography was introduced by Diffie-Hellman. T/F?

Explanation

The issues with key distribution faced by conventional encryption, was overcome by the Public-key cryptography concepts introduced by Diffie-Hellman.

Submit
25. To prevent internal Web servers from being accessed you must block TCP port 20. T/F?

Explanation

The port number 443 must also be blocked.

Submit
26. Which of the following protocols help to gain MAC address of a PC on the network?

Explanation

Address Resolution Protocol (ARP) of the IP protocol suite is responsible for obtaining MAC address of the PC whose IP address is available for communication.

Submit
27. Which of the following does the Biometrics use to establish user identity? Choose all that apply. 

Explanation

Biometrics is a technology used to establish user identity through unique physiological or behavioral characteristics. Fingerprints are one of the most widely recognized biometric identifiers. Each person's fingerprint pattern is unique, and allows for highly accurate and rapid identification. Retinal scans provides a high level of accuracy because the retinal pattern remains stable throughout a person's life. DNA-based identification is typically reserved for situations where the utmost accuracy is required, such as in forensic investigations or specialized security applications.

Submit
28. Which of the following are an advantage and a disadvantage with clear text authentication?

Explanation

Clear text authentication is very simple and easy to implement and verify. But a network that has implemented clear text security is not very secure as it is very easy to decipher clear text passwords.

Submit
29. Which of the following protocols could a VPN make use of? Choose two.

Explanation

A VPN tunnel requires tunneling protocols. L2TP (Layer 2 Tunneling Protocol) and PPTP (Point to Point Tunneling Protocol) are the only two relevant protocols that relate to VPN. HTTP and NNTP are services that are usually configured on a Web Server.

Submit
30. If you cannot afford a hot site, which of the following would be an alternate solution?

Explanation

A warm site would provide all facilities other than computers. Hence the return time to business is usually more than t hat in hot site.

Submit
31. Which of the following is essential for backing up burglar alarms and surveillance systems? Choose two

Explanation

Usually, burglar alarms are connected to the local police or security organization through telephone lines as well as being powered by electric supply. Hence it is important to backup telephone lines as well as power lines.

Submit
32. In case of fire, which o the following needs to be programmed to be put off instantly?

Explanation

Leaving the electric supply on during fire can have disastrous effect on the site. T o avoid this, it is ideal that the electric supply be programmed to be put off with the usage of heat sensors.

Submit
33. Which of the following vulnerabilities could be a common error on the servers?

Explanation

Virus database not being updated as per schedule could be a common but serious error on the servers that gives rise to vulnerabilities.

Submit
34. Stateful inspection firewall will operate on all the 7 layers of the OSI reference model. T/F?

Explanation

Stateful Inspection firewall will not operate on all the & layers of OSI reference mode.

Submit
35. What is the requirement for cryptography? Choose two.

Explanation

Network resource access will have to be controlled through access permissions. Server access will have to be controlled through physical security to the server. Unauthorized access prevention of stored information or information being transmitted is the role of cryptography.

Submit
36. A digital signature is synonymous to which of the following?

Explanation

A digital signature is a mathematical scheme for verifying the authenticity and integrity of digital documents or messages. It is the electronic equivalent of a handwritten signature, providing assurance that the document or message originated from the claimed sender and has not been altered in transit.

Submit
37. If you have implemented a DHCP in your network and you would wish to secure this service so that no external user will be able to become a DHCP client, which of the following would you ensure?

Explanation

Blocking port numbers 67 and 68 on the external interface of the firewall for incoming connections will ensure that no external user will be able to access the internal DHCP server.

Submit
38. When employing message digest, if data does get modified, which of the following will be the result of that modification?

Explanation

When cryptography uses a hash function on plain text, a fixed length of data called the message digest is generated. This message digest helps to preserve the data integrity by generating a digest value when the data was originally transmitted. If during transmission the data gets modified, the message digest value that will be resulting will be a totally different value from the original one. This is usually verified at the receiving end before accepting and confirming the receipt of data.

Submit
39. Differential cryptanalysis is nothing but pattern studying. T/F?

Explanation

Differential Cryptanalysis is nothing but pattern studying. It chooses a pair of plain text with specific differences.

Submit
40. RADIUS is abbreviation for Remote Access Data Inspection User Service. T/F?

Explanation

RADIUS is abbreviation for Remote Access Dial In User Service.

Submit
41. RSA is the encryption system used in cellular devices. T/F?

Explanation

ECC is the encryption system used in cellular devices.

Submit
42. Which of the following can be referred to as highly confidential data?

Explanation

Customer information is usually classified as highly confidential information. Budget related information is classified as confidential information.

Submit
43. Surge protectors are meant to provide backup to electrical and electronic devices. T/F?

Explanation



Power Supply Units provide backup power, whereas surge protectors solely shield devices from transient voltage spikes.
Submit
44. You are configuring a VPN whose tunnel passes through the public network. You are concerned for the security as your VPN may be connecting across the globe to several networks operating on different platforms. Which of the following would be ideal to secure your VPN? Choose the best answer.

Explanation

Since the only protocol that supports cross platform communication is IP, the best way to implement security in this scenario would be through IPSec. PPTP is a tunneling protocol and does not relate to security. Kerberos is a LAN security protocol. Certificates can help in this scenario provided the access limitation is acceptable.

Submit
45. As per a company policy, which of the following personnel should be considered as insiders? Choose two.

Explanation

Although as per certain company policies that provide granular clarity and specific information, even ex-employees are considered as insiders, by and large many corporates consider only key employees and contractors as insiders as they require some kind of an access to the company resources and in specific network resources.

Submit
46. Cyphertext can be used for punch system locks. T/F?

Explanation

Cypher locks can be used in punch lock systems and not Ciphertext. Cyphertext is an encryption scheme.

Submit
47. To allow access to a campus you would use Kerberos. T/F?

Explanation

To allow access to a campus you would use smart cards.

Submit
48. While assigning access privilege using the DAC, which of the following will you be needing?

Explanation

The information of mapping users to their permissions for resource access would be available in the ACL.

Submit
49. In symmetric-key encryption, one key will be used for encryption and another will be used for decryption to provide maximum security. T/F?

Explanation

In symmetric-key encryption, one key will be used for encryption as well as decryption.

Submit
50. Which of the following enhances the server available on the network? Choose the best answer

Explanation

Server clustering is the ideal solution for enhancing file server availability on the network

Submit
51. Which of the following will not be available on a cold site?

Explanation

Cold site usually has electricity and space for furniture. Networking will have to be set up from scratch.

Submit
52. Which of the following is a Wireless LAN susceptible to?

Explanation

Wireless LANs are most susceptible to eavesdropping as the media here is dependent on frequency for transmission and reception. This makes the media very susceptible to overhearing or eavesdropping as well.

Submit
53. Which of the following is the most common attack faced by the DES algorithm?

Explanation

Brute force attack is the most common attack faced by the DES algorithm

Submit
54. Which of the following will be compulsory tasks to run on Web servers of your network? Choose all that apply.

Explanation

There are web sites that keep updating vulnerability information for different platforms. It is ideal to constantly browse these sites and keep checking if it applicable for the platform and applications housed in your web server. Another mandatory task is to update virus definition files regularly.

Submit
55. Which of the following can secure your internal server best, against external attacks? Choose all that apply.

Explanation

The best way to preserve an internal server from external attacks is to make sure there are no unnecessary services running on the server, no unused user names are existing in the user database, all vulnerabilities are being verified and monitored at required intervals.

Submit
56. Which of the following are key components in the Kerberos system? Choose two.

Explanation

In the Kerberos authentication system, the key components include the Ticket Granting Server (TGS) and the Key Distribution Center (KDC). These components work together to provide secure authentication services. Options C, D, and E are not typically considered key components of the Kerberos system.

Submit
57. The keys are measured by bytes. T/F?

Explanation

Keys are measured by bits.

Submit
58. Which of the following is the most popular protocol that is used in dial-up connections?

Explanation

SLIP and PPP are the only two protocols that can be used for dial-up connections. SLIP is now obsolete. PPTP is a tunneling protocol and POP3 is used for mail retrieval.

Submit
59. Which of the following are the two key-based algorithms?

Explanation

There are two types of key-based algorithms. Depending on the key pair types they use, they can be categorized as symmetric or asymmetric algorithms.

Submit
60. Which of the following statements about the SHA (Security Hash Algorithm) are true? Choose two.

Explanation

SHA is a security hash algorithm that is used with encryption protocols. Its latest version is SHA-1

Submit
61. Which of the following types of cryptography is possible? Choose two.

Explanation

Cryptography without encryption and before encryption is not cryptography at all. Cryptography is possible with keys and without keys. When used without keys, it will be using simple or complex substitution.

Submit
62. Which of the following statements are true about the way data classification can be made? Choose two

Explanation

It is important to have a classification of data to ensure correct levels of security to the relevant type of data. Although it is possible to have informal methods to classify data, it is much methodical to employ a strategy to achieve the end result. The usual strategy employs a scheme that splits into different levels to classify data in the organization. The number of levels is usually dependent on the company needs and requirements or security.

Submit
63. Which of the following virus types can be transmitted via email? Choose two most common types that apply.

Explanation

Usually email attachments are documents, pictures or zip files. EXE files are usually too large to be sent as mail attachments hence EXE file virus is not appropriate. Boot record virus is deposited into a system through floppy media and not via email.

Submit
64. Which of the following are capable of functioning as a Firewall? Choose two

Explanation

Proxy service as well as the Router is both capable of Network Address translation (NAT) which is the basic function of a firewall.

Submit
65. When faced with an outgoing packet, which of the following header components would a firewall look at first?

Explanation

The firewall will first look at the destination address.

Submit
66. Which of the following is necessary when analyzing threats?

Explanation

View the data in the history and study any visible occurrences to analyze the pattern and frequency of its occurrence. This will allow you to be better prepared for risk management.

Submit
67. Which of the following will relates to how the external world can access internal network resources?

Explanation

The access policy or the Service access policy will dictate to what extent the external users can access internal network resources or which of the internal resources will be totally inaccessible to the outside world.

Submit
68. Which of the following is true about providing security to database servers? Choose two.

Explanation

It is always safe that you host a database server on a server resource internal to the network rather than on the same server as your Web server. A three-tier model ensures security to your database server as the database server cannot be directly accessed in this model. Centralized or distributed administration will not be a security concern here.

Submit
69. Which of the following is an ideal practice to ensure network resources safety? Choose three.

Explanation

It is not wise to have just one administrator account in case that administrator gets locked out. It is always safe to rename guest and administrator accounts renamed. Administrator passwords must be difficult to guess and should not be blank.

Submit
70. Which of the following is an essential configuration for email messages?

Explanation

Content specific action will ensure that you can discard the mail that is containing sensitive or prohibited data.

Submit
71. To transfer emails between email servers of different domains you would require POP3 service. T/F?

Explanation

To transfer mails between email servers of different domains you would require SMTP service.

Submit
72. When a remote user is dialing-in to the network, which of the following servers would be challenging his request for authentication first? (Select all that apply)

Explanation

In the mentioned scenario, the RADIUS server would be challenging the user's request first, the rest of the servers on the network would then verify with this RADIUS server at a later stage when they receive a request for resource access from this dial-in or remote user.

Submit
73. Which of the following is an advantage of using conventional encryption?

Explanation

When conventional encryption is used for stored data rather than the data being transmitted, encryption and decryption process can be very fast.

Submit
74. The block size in RC5 can range from 0 to 255. Y/N?

Explanation

The block size in RC5 can be 32-bit, 64-bit or 128-bit.

Submit
75. Which of the following is the best way to ensure that contact employees no longer use the network resources once their contract with the organization is over? Choose two

Explanation

A separate group for contract employees will be a good idea as they are all similar in nature of the role and will require similar access to the network. Disabling an account of the contractor who has completed contract is a must as he will no longer be able to log in.

Submit
76. To which layer do the following communicating devices belong? Switch, Ethernet Card.

Explanation

The mentioned devices� purpose is media access. Media access is the responsibility of Layer 2 or the data link layer. Hence the devices belong to data link layer.

Submit
77. Which of the following communications use the 2.4 GHz frequency? Choose three.

Explanation

The microwave operates on the 2.4 GHz range, which is why is it is necessary to place the Wireless 802.11b and g devices slightly apart from Microwave device when used in homes. Bluetooth, as well as Wireless 802.11b and g devices, operate on 2.4 GHz frequency.

Submit
78. Which of the following is provided by IDEA? Choose two.

Explanation

IDEA provides high level of security along with ease of implementation.

Submit
79. You are planning on hosting an eCommerce Web server. You are intent on making the server secure against all external attacks possible. Which of the following would be the best way to test your server for its weaknesses? Choose the best answer.

Explanation

Ping the server will only ensure if the connectivity is proper. Simulating a DoS attack could only test for a very few vulnerabilities on the server. DDoS (Distributed DoS) would test for more vulnerabilities on the server than the DoS would. Checking for patches and antivirus is just a precaution. It is not a process of testing for vulnerabilities.

Submit
80. Which of the following statements regarding Infrared communication is true? Choose three.

Explanation

Infrared and Radio frequency are two different communication media. The Infrared communication requires line of sight. If the device that intends interception is placed in the line of sight as the main devices then interception will be very easy. This mode of communication is least secure.

Submit
81. Which of the following is responsible for key issues relating to the security of inter-bank communications?

Explanation

ABA concerns itself with key issues in providing security to financial transaction/communication between banks.

Submit
82. Which of the following backup is the most time consuming to restore during a server crash?

Explanation

Incremental backups take the fastest to perform in comparison with full and differential backups, but are the longest to restore

Submit
83. Which of the following is required by the cipher when it is important to maintain a message as a secret?

Explanation

To keep a message a secret it is required that the cipher must be able to generate several cipher text.

Submit
84. Which of the following about the Stateful inspection firewall is true? Choose two.

Explanation

The Stateful inspection firewall, monitors connection status based on the state table. It functions on the network layer and monitors connection status for the entire network.

Submit
85. Which of the following best describes Ron's Code 2? (Select all that apply)

Explanation

RC2 or Ron's code 2 is a 64-bit block cipher. It was devised by Ron Rivest.

Submit
86. Which of the following statements relating to the MAC model is true? Choose two.

Explanation

MAC uses a static or predefined set of access privileges and hence cannot allow dynamic sharing of resources.

Submit
87. Which of the following is true about a token system? Choose all that apply.

Explanation

A token is generated when a user has been successfully authenticated. This token is attached to the users� session and will be destroyed once the session is terminated or after the user has logged out. This token will contain user access permission assigned on the network resources for that user.

Submit
88. Which of the following will be required to perform Cryptanalysis? Choose three.

Explanation

Cryptanalysis is a process of studying the pattern of secure communication and breaking it. It involves complex combination such as patience and determination combined with skills of pattern finding, mathematical tools and analytical reasoning.

Submit
89. You are the system administrator for your organization. You are responsible for access privilege for which of the following control systems?

Explanation

System administrator is responsible for access control in the MAC model. The owner of the organization will be responsible for DAC. The RBAC is dependent on the role played by the user in the organization.

Submit
90. It is ideal for any organization to employ an encryption scheme that can address its entire organizations data security either stores or transmitted. T/F?

Explanation

No one encryption scheme can handle the security required by an entire organization. It will usually be a combination of two or more.

Submit
91. When configuring antivirus for email, which of the following configurations must be applied? Choose two.

Explanation

Scan before downloading will ensure the message that is infected will be deleted before actually downloading to the hard disk. Scan before sending will ensure that you are not inadvertently transmitting a virus along with the message tot the destination email Id.

Submit
92. Certificates are best used in which of the following scenarios? Choose all that apply.

Explanation

LAN login will be secure if the network policies in the organization follow book rules. It will not require certificates. Certificates are best used during WAN access. For ex: when using web sites that require you to provide confidential information about yourself, or when you are logging in to the Intranet, from an unknown location. The Dial-up connection in itself does not require any authentication except with the service provider.

Submit
93. If you wish to block FTP access to your Web server, which of the following Firewall types should you consider?

Explanation

Application filtering firewalls operate at the application layer of the OSI model and can block specific applications or protocols, such as FTP. They can identify and block FTP traffic based on its characteristics, such as port numbers, commands, and data patterns.

Submit
94. Which of the following is NOT a common type of social engineering attack?

Explanation

Cross-site scripting (XSS) is a web security vulnerability, not a social engineering tactic. Social engineering manipulates people to gain unauthorized access or information. Phishing uses deceptive emails or websites, pretexting involves creating a false scenario, and baiting offers tempting lures to hook victims.

Submit
95. L2TP can work over which of the following networks? Choose all appropriate answers.

Explanation

L2TP (Layer 2 Tunneling Protocol) was created by Cisco as well as Microsoft. It is meant to function over IP, IPX and SNA networks.

Submit
96. Which of the following statements about Public Key Cryptography are true? Choose two.

Explanation

The implementation of Public key cryptography does not need any existing security measure to be implemented. Public key can only encrypt and Private key can only decrypt.

Submit
97. Which of the following statements about an email server is/are true? Choose only answer(s) that apply

Explanation

Before transmitting any email, the mail server is bound to verify the domain in the destination address of the email to see if it the domain name is self or not before it actually sends the mail out. Before receiving any email its primary security function is to ensure that the email is not infected. In case of the email being infected it is supposed to be discarded.

Submit
98. Which of the following would help with dedicated authentication to dial-in clients? (Select all that apply)

Explanation

TACACS (Terminal Access Controller Access Control System), RADIUS are both dedicated authenticating services for dial-in users. IAS (Internet Authentication Server) is not ideally meant for this purpose.

Submit
99. Which of the following is an ideal location for storing the backup? (select all that apply)

Explanation

Any off site location is good. Within the vicinity of the site will ensure that data backup is safe in case of fire and is also available at short notice when required to restore. In general, Budget and security concerns should dictate distance, as far away location will protect against natural disasters that may effect the city/neighbrohood.

Submit
100. Which of the following does NOT happen during a CHAP authentication? Choose all that apply

Explanation

Whenever a user requests login, the Server poses a challenge and then the user provides the requested password and then the server will decide based on the credentials if it should authorize the user or not. This is what is referred to as three-way handshake.

Submit
View My Results

Quiz Review Timeline (Updated): Jan 21, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 21, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 05, 2006
    Quiz Created by
    Vaibhav Agarwal
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Backup is required only for electric power and not electronic data....
Which of the following firewall policies is most restrictive?
Which of the following services when placed on the edge of the...
Which of the following is necessary even after an employee has...
Which of the following provide protection to the enterprise premises...
If you wish to allow the external users access your Web server you...
Which of the following can be termed as brute force attack?
Which part of the security policies must a user be aware of?
Which of the following is NOT a common type of social engineering...
Cryptography without keys is more secure than cryptography with keys....
Which of the following can affect productivity? Choose two
Does NTFS provide file system security?
Which of the following will allow you to take stock of sensitive data...
Which of the following port numbers is used by SMTP?
Which of the following processes will allow you to ascertain...
Which of the following can be termed as the Denial of Service Attack?
If you had to implement a foolproof method of establishing a User ID...
When debugging an Operating system, a programmer would make use of a...
Which of the following are encryption systems? Choose two.
It is ideal that a network supports a specific encryption standard...
Which of the following statements about a Modem are true? Choose two.
An authorized update is one way of securing the DNS server. T/F?
Which of the following is true about Public/Private key pairs? Choose...
The concept of public key cryptography was introduced by...
To prevent internal Web servers from being accessed you must block TCP...
Which of the following protocols help to gain MAC address of a PC on...
Which of the following does the Biometrics use to establish user...
Which of the following are an advantage and a disadvantage with clear...
Which of the following protocols could a VPN make use of? Choose two.
If you cannot afford a hot site, which of the following would be an...
Which of the following is essential for backing up burglar alarms and...
In case of fire, which o the following needs to be programmed to be...
Which of the following vulnerabilities could be a common error on the...
Stateful inspection firewall will operate on all the 7 layers of the...
What is the requirement for cryptography? Choose two.
A digital signature is synonymous to which of the following?
If you have implemented a DHCP in your network and you would wish to...
When employing message digest, if data does get modified, which of the...
Differential cryptanalysis is nothing but pattern studying. T/F?
RADIUS is abbreviation for Remote Access Data Inspection User Service....
RSA is the encryption system used in cellular devices. T/F?
Which of the following can be referred to as highly confidential data?
Surge protectors are meant to provide backup to electrical and...
You are configuring a VPN whose tunnel passes through the public...
As per a company policy, which of the following personnel should be...
Cyphertext can be used for punch system locks. T/F?
To allow access to a campus you would use Kerberos. T/F?
While assigning access privilege using the DAC, which of the following...
In symmetric-key encryption, one key will be used for encryption and...
Which of the following enhances the server available on the network?...
Which of the following will not be available on a cold site?
Which of the following is a Wireless LAN susceptible to?
Which of the following is the most common attack faced by the DES...
Which of the following will be compulsory tasks to run on Web servers...
Which of the following can secure your internal server best, against...
Which of the following are key components in the Kerberos system?...
The keys are measured by bytes. T/F?
Which of the following is the most popular protocol that is used in...
Which of the following are the two key-based algorithms?
Which of the following statements about the SHA (Security Hash...
Which of the following types of cryptography is possible? Choose two.
Which of the following statements are true about the way data...
Which of the following virus types can be transmitted via email?...
Which of the following are capable of functioning as a Firewall?...
When faced with an outgoing packet, which of the following header...
Which of the following is necessary when analyzing threats?
Which of the following will relates to how the external world can...
Which of the following is true about providing security to database...
Which of the following is an ideal practice to ensure network...
Which of the following is an essential configuration for email...
To transfer emails between email servers of different domains you...
When a remote user is dialing-in to the network, which of the...
Which of the following is an advantage of using conventional...
The block size in RC5 can range from 0 to 255. Y/N?
Which of the following is the best way to ensure that contact...
To which layer do the following communicating devices belong? Switch,...
Which of the following communications use the 2.4 GHz frequency?...
Which of the following is provided by IDEA? Choose two.
You are planning on hosting an eCommerce Web server. You are intent on...
Which of the following statements regarding Infrared communication is...
Which of the following is responsible for key issues relating to the...
Which of the following backup is the most time consuming to restore...
Which of the following is required by the cipher when it is important...
Which of the following about the Stateful inspection firewall is true?...
Which of the following best describes Ron's Code 2? (Select all...
Which of the following statements relating to the MAC model is true?...
Which of the following is true about a token system? Choose all that...
Which of the following will be required to perform Cryptanalysis?...
You are the system administrator for your organization. You are...
It is ideal for any organization to employ an encryption scheme that...
When configuring antivirus for email, which of the following...
Certificates are best used in which of the following scenarios? Choose...
If you wish to block FTP access to your Web server, which of the...
Which of the following is NOT a common type of social engineering...
L2TP can work over which of the following networks? Choose all...
Which of the following statements about Public Key Cryptography are...
Which of the following statements about an email server is/are true?...
Which of the following would help with dedicated authentication to...
Which of the following is an ideal location for storing the backup?...
Which of the following does NOT happen during a CHAP authentication?...
Alert!

Advertisement