Can You Pass This Difficult CompTIA Security+ Exam?

100 Questions | Total Attempts: 62518

SettingsSettingsSettings
Security Plus Quizzes & Trivia

This quiz has been made to see whether you are completely prepared for the real exam. This practice test will help you pass by familiarizing you with the material and the ensuring that you know the structure of the CompTIA Security+ test. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam. So, let's try out this challenging quiz. All the best!


Questions and Answers
  • 1. 
    You are the system administrator for your organization. You are responsible for access privilege for which of the following control systems?
    • A. 

      Mandatory Access Control

    • B. 

      Discretionary Access Control

    • C. 

      Role Based Access Control

    • D. 

      Any of the above

  • 2. 
    While assigning access privilege using the DAC, which of the following will you be needing?
    • A. 

      User database

    • B. 

      Access Control list

    • C. 

      Resource list

    • D. 

      None of the above

  • 3. 
    Which of the following statements relating to the MAC model is true? Choose two.
    • A. 

      MAC uses static mapping or predefined access privileges

    • B. 

      MAC cannot allow dynamic sharing of resources

    • C. 

      MAC uses ACL to assign privileges

    • D. 

      MAC allows dynamic sharing of resources

  • 4. 
    Certificates are best used in which of the following scenarios? Choose all that apply.
    • A. 

      LAN authentication

    • B. 

      Accessing Web sites

    • C. 

      Dial-Up connections

    • D. 

      Intranet login

  • 5. 
    Which of the following does NOT happen during a CHAP authentication? Choose all that apply
    • A. 

      The server issues password to any body requesting for it.

    • B. 

      The server poses the challenge for the password request.

    • C. 

      The server requests for the password.

    • D. 

      The server expects a clear text password initially.

  • 6. 
    Which of the following is true about a token system? Choose all that apply.
    • A. 

      A token is generated when a user has been successfully authenticated

    • B. 

      This token is attached to the users session and will be destroyed once the session is terminated

    • C. 

      This token is attached to the users session and will be destroyed after the user has logged out

  • 7. 
    Which of the following are key components in the Kerberos system? Choose two.
    • A. 

      The Kerberos system requires a Key Distribution Center (KDC) which is responsible for authenticating any network user, Computer or Service.

    • B. 

      None

  • 8. 
    Which of the following does the Biometrics use to establish user identity? Choose two
    • A. 

      Finger prints

    • B. 

      Retinal scan

    • C. 

      Some times the DNA structure too to establish user Id

  • 9. 
    To allow access to a campus you would use Kerberos. T/F?
    • A. 

      True

    • B. 

      False

  • 10. 
    Which of the following are an advantage and a disadvantage with clear text authentication?
    • A. 

      Advantage is that it is easy to remember passwords

    • B. 

      Advantage is that it is easy to implement

    • C. 

      Disadvantage is that it is difficult to implement

    • D. 

      Disadvantage is that it is not secure

  • 11. 
    RADIUS is abbreviation for Remote Access Data Inspection User Service. T/F?
    • A. 

      True

    • B. 

      False

  • 12. 
    Which of the following is a Wireless LAN susceptible to?
    • A. 

      Loss of signal strength

    • B. 

      Eavesdropping

    • C. 

      Blackout

    • D. 

      EMI

  • 13. 
    Which of the following can be termed as the Denial of Service Attack?
    • A. 

      A computer on your network has crashed

    • B. 

      Your router is unable to find a destination outside of your network

    • C. 

      Your Web server has gone into a loop trying to service a client request.

    • D. 

      You keyboard is no longer responding.

  • 14. 
    You are planning on hosting an eCommerce Web server. You are intent on making the server secure against all external attacks possible. Which of the following would be the best way to test your server for its weaknesses? Choose the best answer.
    • A. 

      Ping to the server

    • B. 

      Simulate a DDoS attack on that server

    • C. 

      Simulate a DoS attack on the server

    • D. 

      Check if all the patches and required antivirus software has been loaded o the server.

  • 15. 
    When debugging an Operating system, a programmer would make use of a front door. T/F?
    • A. 

      True

    • B. 

      False

  • 16. 
    Which of the following protocols help to gain MAC address of a PC on the network?
    • A. 

      ARP

    • B. 

      FTP

    • C. 

      TFTP

    • D. 

      DHCP

  • 17. 
    Which of the following is the most popular protocol that is used in dial-up connections?
    • A. 

      SLIP

    • B. 

      PPTP

    • C. 

      POP3

    • D. 

      PPP

  • 18. 
    Which of the following protocols could a VPN make use of? Choose two.
    • A. 

      PPTP

    • B. 

      L2TP

    • C. 

      HTTP

    • D. 

      NNTP

  • 19. 
    You are configuring a VPN whose tunnel passes through the public network. You are concerned for the security as your VPN may be connecting across the globe to several networks operating on different platforms. Which of the following would be ideal to secure your VPN? Choose the best answer.
    • A. 

      PPTP

    • B. 

      IPSec

    • C. 

      Kerberos

    • D. 

      Certificate

  • 20. 
    L2TP can work over which of the following networks? Choose all appropriate answers.
    • A. 

      IP

    • B. 

      IPX

    • C. 

      SNA

    • D. 

      None of the above

  • 21. 
    Which of the following will be compulsory tasks to run on Web servers of your network? Choose two.
    • A. 

      There are web sites that keep updating vulnerability information for different platforms.

    • B. 

      It is ideal to constantly browse these sites and keep checking if it applicable for the platform and applications housed in your web server.

    • C. 

      Update virus definition files regularly.

    • D. 

      None

  • 22. 
    Which of the following virus types can be transmitted via email? Choose two most common types that apply.
    • A. 

      Worms

    • B. 

      Trojan horse

    • C. 

      Boot Record virus

    • D. 

      EXE file virus

  • 23. 
    When configuring antivirus for email, which of the following configurations must be applied? Choose two.
    • A. 

      Scan before downloading

    • B. 

      Scan before sending

    • C. 

      Scan before opening

    • D. 

      Scan after receiving

  • 24. 
    Which of the following port numbers is used by SMTP?
    • A. 

      25

    • B. 

      26

    • C. 

      27

  • 25. 
    Which of the following statements about an email server is/are true? Choose only answer(s) that apply
    • A. 

      Verifies if destination domain is self or not before transmitting a mail

    • B. 

      Verifies if recipient is from local domain or not before receiving an email

    • C. 

      Verifies if email is infected or not

    • D. 

      None of the above

Back to Top Back to top