Can You Pass This Difficult CompTIA Security+ Exam?

100 Questions | Total Attempts: 60498

SettingsSettingsSettings
Security Plus Quizzes & Trivia

This quiz has been made to see whether you are completely prepared for the real exam. This practice test will help you pass by familiarizing you with the material and the ensuring that you know the structure of the CompTIA Security+ test. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam. So, let's try out this challenging quiz. All the best!


Questions and Answers
  • 1. 
    • A. 

      Worms

    • B. 

      Trojan horse

    • C. 

      Boot Record virus

    • D. 

      EXE file virus

  • 2. 
    • A. 

      Mandatory Access Control

    • B. 

      Discretionary Access Control

    • C. 

      Role Based Access Control

    • D. 

      Any of the above

  • 3. 
    While assigning access privilege using the DAC, which of the following will you be needing?
    • A. 

      User database

    • B. 

      Access Control list

    • C. 

      Resource list

    • D. 

      None of the above

  • 4. 
    Which of the following statements relating to the MAC model is true? Choose two.
    • A. 

      MAC uses static mapping or predefined access privileges

    • B. 

      MAC cannot allow dynamic sharing of resources

    • C. 

      MAC uses ACL to assign privileges

    • D. 

      MAC allows dynamic sharing of resources

  • 5. 
    Certificates are best used in which of the following scenarios? Choose all that apply.
    • A. 

      LAN authentication

    • B. 

      Accessing Web sites

    • C. 

      Dial-Up connections

    • D. 

      Intranet login

  • 6. 
    Which of the following does NOT happen during a CHAP authentication? Choose all that apply
    • A. 

      The server issues password to any body requesting for it.

    • B. 

      The server poses the challenge for the password request.

    • C. 

      The server requests for the password.

    • D. 

      The server expects a clear text password initially.

  • 7. 
    • A. 

      A token is generated when a user has been successfully authenticated

    • B. 

      This token is attached to the users session and will be destroyed once the session is terminated

    • C. 

      This token is attached to the users session and will be destroyed after the user has logged out

  • 8. 
    • A. 

      The Kerberos system requires a Key Distribution Center (KDC) which is responsible for authenticating any network user, Computer or Service.

    • B. 

      None

  • 9. 
    Which of the following does the Biometrics use to establish user identity? Choose two
    • A. 

      Finger prints

    • B. 

      Retinal scan

    • C. 

      Some times the DNA structure too to establish user Id

  • 10. 
    To allow access to a campus you would use Kerberos. T/F?
    • A. 

      True

    • B. 

      False

  • 11. 
    • A. 

      Advantage is that it is easy to remember passwords

    • B. 

      Advantage is that it is easy to implement

    • C. 

      Disadvantage is that it is difficult to implement

    • D. 

      Disadvantage is that it is not secure

  • 12. 
    If you had to implement a foolproof method of establishing a User ID in your organization, which of the following would you choose? Choose the best answer.
    • A. 

      Smart Card

    • B. 

      Username/Password

    • C. 

      Biometric

    • D. 

      Credit Card

  • 13. 
    RADIUS is abbreviation for Remote Access Data Inspection User Service. T/F?
    • A. 

      True

    • B. 

      False

  • 14. 
    If you were implementing an Enterprise network that requires remote users connecting to the Intranet, which of the following services would be most important?
    • A. 

      DNS

    • B. 

      DHCP

    • C. 

      RAS

    • D. 

      None of the above

  • 15. 
    Which of the following services when placed on the edge of the network, will provide security to the entire network?
    • A. 

      Firewall

    • B. 

      Router

    • C. 

      Antivirus

    • D. 

      None of the above

  • 16. 
    Which of the following is a Wireless LAN susceptible to?
    • A. 

      Loss of signal strength

    • B. 

      Eavesdropping

    • C. 

      Blackout

    • D. 

      EMI

  • 17. 
    Which of the following can be termed as the Denial of Service Attack?
    • A. 

      A computer on your network has crashed

    • B. 

      Your router is unable to find a destination outside of your network

    • C. 

      Your Web server has gone into a loop trying to service a client request.

    • D. 

      You keyboard is no longer responding.

  • 18. 
    • A. 

      Ping to the server

    • B. 

      Simulate a DDoS attack on that server

    • C. 

      Simulate a DoS attack on the server

    • D. 

      Check if all the patches and required antivirus software has been loaded o the server.

  • 19. 
    When debugging an Operating system, a programmer would make use of a front door. T/F?
    • A. 

      True

    • B. 

      False

  • 20. 
    Which of the following protocols help to gain MAC address of a PC on the network?
    • A. 

      ARP

    • B. 

      FTP

    • C. 

      TFTP

    • D. 

      DHCP

  • 21. 
    To transfer emails between email servers of different domains you would require POP3 service. T/F?
    • A. 

      True

    • B. 

      False

  • 22. 
    Which of the following is the most popular protocol that is used in dial-up connections?
    • A. 

      SLIP

    • B. 

      PPTP

    • C. 

      POP3

    • D. 

      PPP

  • 23. 
    Which of the following protocols could a VPN make use of? Choose two.
    • A. 

      PPTP

    • B. 

      L2TP

    • C. 

      HTTP

    • D. 

      NNTP

  • 24. 
    When a remote user is dialling-in to the network, which of the following servers would be challenging his request for authentication first?
    • A. 

      RADIUS server would be challenging the users request first, the rest of the servers on the network

    • B. 

      RADIUS server at a later stage when they receive a request for resource access from this dial-in or remote user

    • C. 

      None

  • 25. 
    You are configuring a VPN whose tunnel passes through the public network. You are concerned for the security as your VPN may be connecting across the globe to several networks operating on different platforms. Which of the following would be ideal to secure your VPN? Choose the best answer.
    • A. 

      PPTP

    • B. 

      IPSec

    • C. 

      Kerberos

    • D. 

      Certificate