This CompTIA Security+ part 3 quiz assesses knowledge on handling security risks and implementing protective measures in IT environments. Topics include risk management, malware protection, and network security, crucial for professionals aiming to enhance their cybersecurity skills.
Trojan
Worm
Botnet
Logic bomb
Rate this question:
Mantrap
Security badges
Hardware locks
Token access
Rate this question:
Weak passwords
Expired passwords
Locked passwords
Backdoor passwords
Rate this question:
Antivirus
Pop-up blocker
Anti-spyware
Personal software firewall
Rate this question:
Combination locks and key locks
Smartcard and proximity reader
Magnetic lock and pin
Biometric reader and smartcard
Rate this question:
Cryptography
Digital signature
Hashing
Steganography
Rate this question:
Install a repeater
Uninterruptible power supply (UPS)
Faraday cage
Disable SSID broadcast
Rate this question:
Piggybacking
Social engineering
Dumpster diving
Shoulder surfing
Rate this question:
Computers must be configured for automated patch management
Computer media must be sanitized
Default passwords must be changed once
Computers must be tested against known TCP/IP vulnerabilities
Rate this question:
Fault tolerance
Key recovery
Data recovery
Integrity
Rate this question:
Reformat the hard drives once
Use a certified wipe program to erase data
Install antivirus on the drives
Run anti-spyware on the drives
Rate this question:
User authentication
Need-to-know
Least privilege
Job role
Rate this question:
Digital signature
Internet key exchange
Certificate authority
Symmetric key
Rate this question:
Automatic callback
Monitoring outbound calls
Awareness training
Use of VoIP
Rate this question:
L2TP
SSH
SSL
HTTP
Rate this question:
Install a network operating system on new equipment
Create a virtual server on existing equipment
Install a network operating system on existing equipment
Create a virtual server on new equipment
Rate this question:
At time of hire
At time of first correspondence
At time of departure
At time of first system login
Rate this question:
Accept the risk
Mitigate the risk
Reject the risk
Run a new risk assessment
Rate this question:
Log on only as administrator
Install only needed software
Check the logs regularly
Report all security incidents
Rate this question:
A S/MIME buffer overflow
A POP3 protocol exception
DNS poisoning
A SMTP open relay
Rate this question:
Penetration testing
Protocol analyzers
Port scanners
Vulnerability testing
Rate this question:
If the physical server crashes, all of the local virtual servers go offline immediately
If the physical server crashes, all of the physical servers nearby go offline immediately
If the virtual server crashes, all of the local virtual servers go offline immediately
If the virtual server crashes, all of the physical servers go offline immediately
Rate this question:
Least privilege
Separation of duties
Reducing stress
Detecting fraud
Rate this question:
A security template
A service pack
A patch
A hotfix
Rate this question:
False negative
False positive
True negative
True positive
Rate this question:
Signature-based tool
Protocol analyzer
Honeynet
Anomaly-based tool
Rate this question:
File integrity auditing
Host based intrusion detection
Network based intrusion detection
Stateful packet filtering
Rate this question:
A hash produces a variable output for any input size, a cipher does not
A cipher produces the same size output for any input size, a hash does not
A cipher can be reversed, a hash cannot
A hash can be reversed, a cipher cannot
Rate this question:
Spyware
Trojan
Privilege
DoS
Rate this question:
Monitoring and acceptance
Evaluation and assessment
Assessment and eradication
Mitigation and repudiation
Rate this question:
The remote PC has a spam slave application running and the local PCs have a spam master application running
The remote PC has a zombie master application running and the local PCs have a zombie slave application running
The remote PC has a spam master application running and the local PCs have a spam slave application running
The remote PC has a zombie slave application running and the local PCs have a zombie master application running
Rate this question:
Backup all data at a preset interval to tape and store those tapes at a sister site across the street
Backup all data at a preset interval to tape and store those tapes at a sister site in another city
Backup all data at a preset interval to removable disk and store the disk in a safety deposit box at the administrators home
Backup all data at a preset interval to removable disk and store the disk in a fireproof safe in the buildings basement
Rate this question:
Store the keys in escrow
Immediately delete the account
Store them in CRL
Obtain the employees hardware token
Rate this question:
User
System
Help desk
Owner
Rate this question:
Protocol analyzer
Penetration testing tool
Network mapper
Vulnerability scanner
Rate this question:
Fuzzing
Vampire tap
Crosstalk
Refraction
Rate this question:
Cipher key
Shared key
Public key
Private key
Rate this question:
Patch management
Installing antivirus
Installing HIDS
Disabling unused services
Rate this question:
Updating the firewall configuration to include the patches
Running a NIDS report to list the remaining vulnerabilities
Auditing for the successful application of the patches
Backing up the patch file executables to a network share
Rate this question:
Near a fiber optic cable entrance
Near a shared LCD screen
Near a power line
Near a high end server
Rate this question:
Netops
Lanman
Netstat
Ipconfig /all
Rate this question:
Forensics software
Drive optimization
Drive sanitization
Damage and loss control
Rate this question:
Signature based HIDS
Pop-up blocker applications
Antivirus applications
Rootkit detection applications
Rate this question:
Two-factor authentication
Kerberos authentication
EAP authentication
Three-factor authentication
Rate this question:
S/MIME
SSH
3DES
IPSec
Rate this question:
Review security access logs
A network mapper
A protocol analyzer
Review DNS logs
Rate this question:
Applying security templates
Running weekly spyware applications
Network-based patch management
Disabling all non-required services
Rate this question:
A patch in a service pack fixes the issue, but too many extra patches are included
A patch is not available and workarounds do not correct the problem
A patch is available, but has not yet been tested in a production environment
A patch is too large to be distributed via remote deployment tool
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.