CompTIA Security+ Practice Exam- 2

81 Questions | Total Attempts: 14090

SettingsSettingsSettings
CompTIA Security+ Practice Exam- 2

Full length Comptia Security+ Practice Exam. This is the second free mock exam at Proprofs. We suggest you do this exam after completing the free Security+ practice question available on the site. Take this exam like the real exam to see if you are completly prepared for the real exam. This FREE online Security+ practice test will help you pass by familiarizing you with the material and the ensuring that you know the structure of the Security+ test. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.


Questions and Answers
  • 1. 
    You have created a folder on your server that will be holding confidential data. You wish to assign privilege access to the same. You will be choosing which of the following control systems?
    • A. 

      Mandatory Access Control

    • B. 

      Discretionary Access Control

    • C. 

      Role Based Access Control

    • D. 

      Any of the above

  • 2. 
    While assigning access privilege using the RBAC model, which of the following will you be needing?
    • A. 

      Responsibilities attached to the role played by the user

    • B. 

      Access Control list

    • C. 

      Resource list

    • D. 

      User Database

  • 3. 
    Which of the following statements about password encryption is true? Choose all that apply.
    • A. 

      PAP allows maximum security

    • B. 

      CHAP allows maximum security

    • C. 

      PAP is a two-way handshake

    • D. 

      CHAP is a three-way handshake.

  • 4. 
    Certificates can be assigned to which of the following? Choose all that apply
    • A. 

      User

    • B. 

      Computer

    • C. 

      Web site

    • D. 

      Operating System

  • 5. 
    Which of the following about the Kerberos system is true? Choose all that apply.
    • A. 

      Kerberos is ideal for WAN security

    • B. 

      Kerberos uses a ticket to attach credentials to users.

    • C. 

      Kerberos needs a certificate authority to be present in the network

    • D. 

      Kerberos is ideally meant for LAN

  • 6. 
    • A. 

      A Certificate can be issued by a third party only.

    • B. 

      A Certificate enhances the credibility of the end object to which it has been assigned.

    • C. 

      A Certificate when assigned to a user enhances user access permissions on the network resources for that user.

    • D. 

      A Certificate requires a Certification authority to be generated.

    • E. 

      A Certificate is used for secure authentication.

  • 7. 
    Which of the following can be enabled to issue certificates in a network that requires Certificates for security? Choose two.
    • A. 

      Certificate Server

    • B. 

      Administrator

    • C. 

      Owner

    • D. 

      Third party Certificate Server

  • 8. 
    If you wanted to provide a user limited access to network, which of the following authentication methods would you use? Choose the best answer.
    • A. 

      Username/Password

    • B. 

      Smart Card

    • C. 

      Certificate

    • D. 

      Token

  • 9. 
    MS-CHAP is abbreviation for Most Secure � Challenge Handshake Authentication Protocol. T/F?
    • A. 

      True

    • B. 

      False

  • 10. 
    If you were implementing a network that required users to be assigned certificates for authentication, which of the following services would be most important?
    • A. 

      Certificate Service

    • B. 

      IIS

    • C. 

      RAS

    • D. 

      None of the above

  • 11. 
    Which of the following services is capable of hiding internal network IP addresses?
    • A. 

      Proxy

    • B. 

      RAS

    • C. 

      DNS

    • D. 

      DHCP

  • 12. 
    Which of the following can ensure that eavesdropping does not occur on wireless LANs?
    • A. 

      Encrypting passwords

    • B. 

      Encrypting usernames

    • C. 

      Encrypting data

    • D. 

      Encrypting data as well as passwords.

  • 13. 
    Which of the following could give rise to DoS on the destination end of the command?
    • A. 

      Ftp

    • B. 

      Ping

    • C. 

      IPCONFIG

    • D. 

      Trace

  • 14. 
    Which of the following would indicate that the Web Server in your organization has been subjected to the DoS attack? Choose the best answer.
    • A. 

      The servers� behavior would be erratic.

    • B. 

      The user would not be able to access the Web Server.

    • C. 

      All resources attached to the Web Server would stop functioning

    • D. 

      The entire network stops functioning.

  • 15. 
    Super imposing the internal IP address of a network on to your own for the purpose of gaining access to the network is referred to as Eavesdropping. T/F?
    • A. 

      True

    • B. 

      False

  • 16. 
    Which of the following protocol helps to address and IP multicast group?
    • A. 

      ICMP

    • B. 

      IGMP

    • C. 

      IGRP

    • D. 

      EIGRP

  • 17. 
    To transfer mails between email servers and client of the same domain you would require POP3 service. T/F?
    • A. 

      True

    • B. 

      False

  • 18. 
    Which of the following protocols is used for connecting UNIX hosts or terminals?
    • A. 

      PPP

    • B. 

      RS232

    • C. 

      SLIP

    • D. 

      V35

  • 19. 
    If you required a dedicated service to authenticate remote users on your network, which of the following would you choose?
    • A. 

      RAS

    • B. 

      DHCP

    • C. 

      HTTP

    • D. 

      RADIUS

  • 20. 
    Which of the following is true about the RADIUS server?
    • A. 

      It needs an independent administrator

    • B. 

      It can be managed by the central administrator

    • C. 

      It needs to be configured on the central server

    • D. 

      None of the above

  • 21. 
    Which of the following port numbers is used by POP3?
    • A. 

      25

    • B. 

      20

    • C. 

      110

    • D. 

      119

  • 22. 
    • A. 

      An email client can retrieve mails only from an email server

    • B. 

      An email client needs a retrieval protocol as well as an email application

    • C. 

      It is mandatory that emails are scanned if an email client has to be operational

    • D. 

      None of the above

  • 23. 
    Which of the following is true about cellular communication? Choose three.
    • A. 

      It uses radio frequency for main communication.

    • B. 

      Advanced phones use Infrared for data transfer.

    • C. 

      Its reception/transmission range will depend upon the service providers� signal strength

    • D. 

      Its reception/transmission range will depend upon the cellular devices� signal strength

  • 24. 
    Which of the following devices may require a modem for WAN communication? Choose two.
    • A. 

      PC

    • B. 

      Routers

    • C. 

      Switches

    • D. 

      None of the above.

  • 25. 
    Which of the following layers is responsible for assigning the correct standard of signal strength to the communicating devices?
    • A. 

      Physical layer

    • B. 

      Datalink layer

    • C. 

      Network Layer

    • D. 

      None of the above