CompTIA Security+ (SY0-201) Practice Exam
Keep coming back as more questions are added daily. Goal is a test with over 700 randomly selected questions so each attempt has a different set of 50 questions per attempt.
177 of 730 loaded..//22Sept2010
Disclaimer: I have been told from those that have gone to take the actual test that these questions are dissimilar. However, the basic disciplines are covered and should help considerably to pick out key associations between questions and answers.
SSL
SSH
L2TP
IPSec
Steganography
Worm
Trojan horse
Virus
Teardrop
TCP/IP hijacking
Phishing
Replay
By conducting another backup
By using software to recover deleted files
By restoring part of the backup
By reviewing the written procedures
By conducting another backup
By using software to recover deleted files
By restoring part of the backup
By reviewing the written procedures
Vulnerability scanner
NIPS
Protocol analyzer
Network mapper
When the technician suspects that weak passwords exist on the network
When the technician is trying to guess passwords on a network
When the technician has permission from the owner of the network
When the technician is war driving and trying to gain access
SMTP open relaying is enabled
It does not have a spam filter
The amount of sessions needs to be limited
The public IP address is incorrect
Hashing algorithms
Symmetric key algorithms
Asymmetric key algorithms
ECC algorithms
Rogue access points
War driving
Weak encryption
Session hijacking
Discovering the IP address of a device from the MAC address
Discovering the IP address of a device from the DNS name
Discovering the MAC address of a device from the IP address
Discovering the DNS name of a device from the IP address
A security patch
A security hotfix
An OS service pack
A security template
$900
$2,290
$2,700
$5,000
Message digest
Encrypt information
Hide information
Data integrity
3DES
AES
DH-ECC
MD5
IP spoofing
MAC filtering
SSID spoofing
Closed network
53
389
443
636
DNS logs
Application logs
Firewall logs
DHCP logs
One
Two
Five
Seven
DDoS
Privilege escalation
Disclosure of PII
Single point of failure
Proxy server9
Firewall
NIDS
Honeynet
Honeynet
DMZ
Honeypot
VLAN
RSA
AES
3DES
L2TP
Antivirus
Content filter
Firewall
Proxy server
Service pack management
Patch application
Hotfix management
Change management
Whitelist
Signature
Blacklist
ACL
Salt
Increase the input length
Rainbow Table
Larger key space
Change management
Secure disposal
Password complexity
Chain of custody
Install a word processor
Run the latest spyware
Apply the baseline configuration
Run OS updates
VLANs
NAT
Access lists
Intranet
Trojan
Spam
Phishing
DNS Poisoning
The key owner has exclusive access to the private key
Everyone has access to the private key on the CA
Only the CA has access to the private key
The key owner and a recipient of an encrypted email have exclusive access to the private key
Security logs
DHCP logs
DNS logs
Antivirus logs
Phishing
Adware
Botnet
Trojan
Network intrusion detection
Patch management
Firewall configuration
Antivirus selection
Input validation
Object oriented coding
Rapid Application Development (RAD)
Cross-site scriptings
Intrusion detection
Virtualization
Kiting
Cloning
Proxy serverl
Honeypot
Internet content filters
Firewall
Hijacking
Policy subversion
Trojan
DoS
ACL
Account expiration
Time of day restrictions
Logical tokens
A port monitor utility shows that there are many connections to port 80 on the Internet facing web server.
A performance monitor indicates a recent and ongoing drop in speed, disk space or memory utilization from the baseline.
A protocol analyzer records a high number of UDP packets to a streaming media server on the Internet.
The certificate for one of the web servers has expired and transactions on that server begins to drop rapidly.
Intrusion detection logs
Firewall logs
Antivirus logs
DNS logs
Role-Based Access Control (RBAC)
Rule-Based Access control (RBAC)
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Rule-Based Access control (RBAC)
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
Job rotation
Mandatory vacations
Least privilege
Separation of duties
TACACS
RAS
RADIUS
Kerberos
RADIUS
Password cracker
Port scanner
Man-in-the-middle attack
Availability
Integrity
Non-repudiation
Confidentiality
Trojan horse
Worm
Steganography
Virus
Certificate revocation list
Certificate suspension
Recovery agent
Certificate authority
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.