Set 2 CompTIA Security+ Exam Practice: Securing Communication & Infrastructure

22 Questions
Security Plus Quizzes & Trivia

This is Set 2 of 4 of practice questions for Comptia Security+ exam. This set covers the exam objective Securing Communication & other Infrastructure. You can take these for practice or take it as a topic wise practice exam. Feedback and comments are welcome!

Please wait...
Questions and Answers
  • 1. 
    Which of the following accepts authentication requests from remote clients?
    • A. 

      Authenticating server

    • B. 

      RADIUS Server

    • C. 

      HTTP Server

    • D. 

      File Server

  • 2. 
    Which of the following can be used to provide security for a VPN?
    • A. 

      PPTP

    • B. 

      IPSec

    • C. 

      Kerberos

    • D. 

      Certificate

  • 3. 
    Which of the following would not help with dedicated authentication to dial-in clients?
    • A. 

      RRAS

    • B. 

      RADIUS

    • C. 

      IAS

    • D. 

      None of the above

  • 4. 
    L2TP can work over IPX based networks. Y/N?
    • A. 

      Yes

    • B. 

      No

  • 5. 
    Which of the following is the best way to obtain vulnerability related information for database servers?
    • A. 

      Write to the respective vendor at frequent intervals

    • B. 

      Look up related web sites

    • C. 

      Look up news bulletins

    • D. 

      None of the above

  • 6. 
    Infrared rays have a wide and far reachability. T/F?
    • A. 

      True

    • B. 

      False

  • 7. 
    A Modem modulates and demodulates data signals. T/F?
    • A. 

      True

    • B. 

      False

  • 8. 
    An RJ-11 connector would belong to which of the following layers?
    • A. 

      Physical layer

    • B. 

      Datalink layer

    • C. 

      Network Layer

    • D. 

      None of the above

  • 9. 
    Which of the following communications does not use the 2.4 GHz frequency?
    • A. 

      Wireless 802.11b and g

    • B. 

      Microwave

    • C. 

      Radio frequency

    • D. 

      All of the above

  • 10. 
    Which of the following firewall types will allow for port security?
    • A. 

      Stateful Inspection

    • B. 

      Packet filtering

    • C. 

      Application filtering

    • D. 

      None of the above

  • 11. 
    Which of the following is capable of functioning as a Firewall?
    • A. 

      NAT box

    • B. 

      Router

    • C. 

      PC

    • D. 

      Switch

  • 12. 
    The Stateful inspection firewall, monitors connection status based on the routing table. T/F?
    • A. 

      True

    • B. 

      False

  • 13. 
    Stateful inspection firewall will operate on all the 7 layers of the OSI reference model. T/F?
    • A. 

      True

    • B. 

      False

  • 14. 
    An Access policy is nothing but the access control list. T/F?
    • A. 

      True

    • B. 

      False

  • 15. 
    Which of the following firewall policies is most restrictive?
    • A. 

      Any any

    • B. 

      Deny all

    • C. 

      Permit all

    • D. 

      None of the above

  • 16. 
    Which of the following will be verified first for an incoming packet?
    • A. 

      Protocol information

    • B. 

      Source address

    • C. 

      Destination address

    • D. 

      No of bytes in the header

  • 17. 
    Port number 110 relates to Web services. T/F?
    • A. 

      True

    • B. 

      False

  • 18. 
    OS hardening is not possible on web servers. T/F?
    • A. 

      True

    • B. 

      False

  • 19. 
    Which of the following models for hosting a Database server is most secure?
    • A. 

      Two-tier model

    • B. 

      Three-tier model

    • C. 

      Centralized model

    • D. 

      None of the above

  • 20. 
    Which of the following accounts should be renamed for network resources safety?
    • A. 

      Guest account

    • B. 

      Backup operator account

    • C. 

      Every user account

    • D. 

      None of the above

  • 21. 
    Port number for internal web server is 80. T/F?
    • A. 

      True

    • B. 

      False

  • 22. 
    FAT is the most secure of all Microsoft based file system. Y/N?
    • A. 

      Yes

    • B. 

      No