This COMPTIA Security+ part 4 quiz assesses knowledge on operating system hardening, patch management, network monitoring, and IPSec protocols. It's designed to test the understanding of essential security practices and tools, vital for professionals aiming to enhance their cybersecurity expertise.
Logic bomb
Trojan horse
Worm
Rootkit
Rate this question:
Update antivirus definitions
Disconnect the entire network from the internet
Apply proper forensic techniques
Restore missing files on the affected system
Rate this question:
DoS
Man-in-the-middle
DDoS
TCP/IP hijacking
Rate this question:
Back door
Worm
Zombie
Trajan
Rate this question:
Mirrored site
Cold site
Warm site
Hot site
Rate this question:
To evaluate the scene and repair the problem
To secure the scene and preserve evidence
To evaluate the scene and determine the cause
To gather evidence and write reports
Rate this question:
Static electricity
Power surge
Electromagnetic interference
Brown out
Rate this question:
HTTPS
Telnet
SFTP
SHTTP
Rate this question:
NIDS
DMZ
NAT
VLAN
Rate this question:
Immediately following lessons learned sessions
Once a month, during peak business hours
After the network is stable and online
In accordance with the disaster recovery plan
Rate this question:
Elevate system privileges
Monitor network traffic
Capture private keys
Begin key recovery
Rate this question:
Implicit deny
Separation of duties
Least privilege
Job rotation
Rate this question:
Defense-in-depth
Logical token
ACL
Mantrap
Rate this question:
HIDS
Personal software firewall
NIDS
ACL
Rate this question:
Due process
Due diligence
Scope of work
Service level agreement
Rate this question:
Booking slip
Affidavit
Chain of custody
Evidence log
Rate this question:
Man-in-the-middle attack
Protocol analysis
Privilege escalation
Cross-site scripting
Rate this question:
Hotfix
Remote desktop
Patch management
Service packs
Rate this question:
A
B
At the middle of a vulnerability assessment
At the beginning of a vulnerability assessment
When there is a need to document vulnerabilities
At the end of a penetration test assessment
Rate this question:
Separation of duties
Implicit deny
Least privilege
Job rotation
Rate this question:
Two-factor authentication
RADIUS
LDAP
Kerberos
Rate this question:
One
Two
Three
Four
Rate this question:
Botnets
Adware
Spyware
Trojans
Rate this question:
CHAP
PKI
PGP
Kerberos
Rate this question:
Authentication
Identification
Verification
Validation
Rate this question:
Mobile device
Transaction
Firewall
Performance
Rate this question:
Content filter
Protocol analyzer
Honeypot
HIDS
Rate this question:
Rogue access points being installed
Copying sensitive information with cellular phones
Removing mass storage iSCSI drives
Removing network attached storage
Rate this question:
Registration
Certificate Authority
Recovery agent
Key escrow
Rate this question:
DNS poisoning
Domain hijacking
Spoofing
Kiting
Rate this question:
Acceptable use policy
Data retention and disclosure policy
Service level agreement
Written permission
Rate this question:
Weekly
Incremental
Disk Image
Differential
Rate this question:
Port scanner
Performance monitor
Ipconfig /all
TFTP
Rate this question:
Validate the user
Authorize the user
Verify the user
Authenticate the user
Rate this question:
Key distribution center
Account lockout duration
Account lockout threshold
Password complexity requirements
Rate this question:
Compressed air
Tape recorder
Fingerprint cards
Digital camera
Rate this question:
MD5 hashing
Symmetric key
Symmetric algorithm
Digital signatures
Rate this question:
Antivirus log
RADIUS log
Performance log
Host firewall log
Rate this question:
Encapsulating security payload
Internet key exchange
Temporal key interchange protocol
Authentication Header (AH)
Rate this question:
Decentralized antivirus
Host based intrusion detection
Centralized antivirus
Spyware detection
Rate this question:
ATM PIN code
Elliptic curve
One-time password
Digital certificate
Rate this question:
Bluesnarfing
War dialing
War chalking
War driving
Rate this question:
MD5
AES128
ROT13
SHA-1
Rate this question:
Adware
Spyware
Spam
Viruses
Rate this question:
MAC flooding
ARP poisoning
DNS poisoning
DNS spoofing
Rate this question:
Smart card
Defense-in-depth
Mantrap
DMZ
Rate this question:
Implement the server as a honeypot
Implement the server as a virtual server instance
Load balance between two identical servers
Install the server on a separate VLAN segment
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.