CompTIA Security+ (2008 Edition) Exam Version 39.0

7 Questions | Total Attempts: 352

SettingsSettingsSettings
Security Plus Quizzes & Trivia

CompTIA Security+ (2008 Edition) Exam Version 39. 0


Questions and Answers
  • 1. 
     A security administrator wants to implement a more secure way to login to a VPN in addition to a username and password. Which of the following is the MOST secure way to log in to a VPN?
    • A. 

      A. Implementing an ACL

    • B. 

      B. Setting up a PKI

    • C. 

      C. Implementing a single sign on process

    • D. 

      D. Setting up two VPNs

  • 2. 
    Which of the following is the BEST example of a physical security policy? 
    • A. 

      A. All doors to the server room must have signage indicating that it is a server room.

    • B. 

      B. All server room users are required to have unique usernames and passwords.

    • C. 

      C. All new employees are required to be mentored by a senior employee for their first few months on the job

    • D. 

      D. New server room construction requires a single entrance that is heavily protected.

  • 3. 
    p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 11.9px Helvetica} The success of a user security education and awareness plan is largely dependent on support from:
    • A. 

      A. contractors.

    • B. 

      B. project management.

    • C. 

      C. human resources.

    • D. 

      D. senior management

  • 4. 
    Which of the following signature-based monitoring systems is used to remove known worms and Trojans on a host?
    • A. 

      A. NIPS

    • B. 

      B. Antivirus

    • C. 

      C. Anti-spam

    • D. 

      D. HIDS

  • 5. 
    Which of the following is the MOST efficient way to secure a single laptop from an external attack?
    • A. 

      A. NIPS

    • B. 

      B. HIDS

    • C. 

      C. Software firewall

    • D. 

      D. Hardware firewall

  • 6. 
    Disabling the SSID broadcast removes the identifier from which of the following wireless packets?
    • A. 

      A. Probe

    • B. 

      B. ACK

    • C. 

      C. Beacon

    • D. 

      D. Data

  • 7. 
    Which of the following describes the role of a proxy server?
    • A. 

      D. Forwards requests for services from a client

    • B. 

      B. Serves as a honeypot

    • C. 

      C. Blocks access to the network

    • D. 

      A. Analyzes packets

Back to Top Back to top