This quiz has been made to see whether you are completely prepared for the real exam. This practice test will help you pass by familiarizing you with the material and the ensuring that you know the structure of the CompTIA Security+ test. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice See moretest is designed to reflect the final exam. So, let's try out this challenging quiz. All the best!
User database
Access Control list
Resource list
None of the above
Rate this question:
MAC uses static mapping or predefined access privileges
MAC cannot allow dynamic sharing of resources
MAC uses ACL to assign privileges
MAC allows dynamic sharing of resources
Rate this question:
LAN authentication
Accessing Web sites
Dial-Up connections
Intranet login
Rate this question:
A token is generated when a user has been successfully authenticated
This token is attached to the users session and will be destroyed once the session is terminated
This token is attached to the users session and will be destroyed after the user has logged out
Rate this question:
True
False
Rate this question:
Advantage is that it is easy to remember passwords
Advantage is that it is easy to implement
Disadvantage is that it is difficult to implement
Disadvantage is that it is not secure
Rate this question:
True
False
Rate this question:
Loss of signal strength
Eavesdropping
Blackout
EMI
Rate this question:
A computer on your network has crashed
Your router is unable to find a destination outside of your network
Your Web server has gone into a loop trying to service a client request.
You keyboard is no longer responding.
Rate this question:
Ping to the server
Simulate a DDoS attack on that server
Simulate a DoS attack on the server
Check if all the patches and required antivirus software has been loaded o the server.
Rate this question:
True
False
Rate this question:
ARP
FTP
TFTP
DHCP
Rate this question:
SLIP
PPTP
POP3
PPP
Rate this question:
PPTP
L2TP
HTTP
NNTP
Rate this question:
PPTP
IPSec
Kerberos
Certificate
Rate this question:
IP
IPX
SNA
None of the above
Rate this question:
Worms
Trojan horse
Boot Record virus
EXE file virus
Rate this question:
Scan before downloading
Scan before sending
Scan before opening
Scan after receiving
Rate this question:
25
26
27
Rate this question:
Verifies if destination domain is self or not before transmitting a mail
Verifies if recipient is from local domain or not before receiving an email
Verifies if email is infected or not
None of the above
Rate this question:
It requires line of sight
It requires the same radio frequency at the transmitting and receiving end.
It is least secure.
Interception is possible if the tapping devices is also in the line of sight
Interception is possible if the tapping device is also tuned to the same radio frequency as the main communicating devices.
Rate this question:
It steps us AC voltage
It steps down DC voltage
It modulates and demodulates signals for the Computer and the telephone line.
It converts Analog signals to digital and vice versa.
Rate this question:
Physical layer
Datalink layer
Network Layer
None of the above
Rate this question:
It maintains a state table
It maintains a routing table
It functions on the network layer
It functions on the application layer.
Rate this question:
True
False
Rate this question:
Any any
Deny all
Permit all
None of the above
Rate this question:
Protocol information
Source address
Destination address
No of bytes in the header
Rate this question:
True
False
Rate this question:
Perform OS hardening by blocking all access to this server
Perform OS hardening by verify and terminating all un used service
Regularly check for unused usernames and disable or delete them.
Ensure you are running a vulnerability check on this server at regular intervals.
Rate this question:
Do not host a database server on the same server as your web server.
Do not host a database server on a server based system
Employ a three-tier model
Employ a centralized administration model.
Rate this question:
True
False
Rate this question:
Yes
No
Rate this question:
SHA is a security hash algorithm that is used with encryption protocols
Its latest version is SHA-1
None
Rate this question:
They form an essential part of Website security
They are used by Certificate security system
They are a pair of clear text passwords
They are obsolete.
Rate this question:
True
False
Rate this question:
To avoid unauthorized access of information being stored
To avoid unauthorized access of network resources
To avoid unauthorized access of information being transmitted.
To avoid unauthorized access of network servers
Rate this question:
Mathematical tools
Analytical reasoning
Pattern finding
Mathematical reasoning
Advanced calculators
Rate this question:
True
False
Rate this question:
It is the most secure
It is very fast
It is economical
None of the above
Rate this question:
True
False
Rate this question:
You need to have a security setup configured on both the sending as well as the receiving ends to implement Public Key Cryptography.
You do not need an existing security setup
Public key can only encrypt and private key can only decrypt.
Public key can encrypt as well as decrypt, private key can only decrypt
None of the above
Rate this question:
True
False
Rate this question:
Symmetric algorithm
Asymmetric algorithm
128-bit key algorithm
1024-bit key algorithm
Rate this question:
Cryptography with keys
Cryptography without keys
Cryptography before encryption
Cryptography without encryption
Rate this question:
True
False
Rate this question:
Generate one cipher text for that message
Generate at least 5 cipher text for that message
Generate several cipher text.
None of the above.
Rate this question:
DoS
Brute force attack
Code attack
None of the above
Rate this question:
True
False
Rate this question:
Quiz Review Timeline (Updated): Jan 21, 2025 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.