
This quiz has been made to see whether you are completely prepared for the real exam. This practice test will help you pass by familiarizing you with the material and the ensuring that you know the structure of the CompTIA Security+ test. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam. So, let's try out this challenging quiz. All the best!
Mandatory Access Control
Discretionary Access Control
Role Based Access Control
Any of the above
User database
Access Control list
Resource list
None of the above
MAC uses static mapping or predefined access privileges
MAC cannot allow dynamic sharing of resources
MAC uses ACL to assign privileges
MAC allows dynamic sharing of resources
LAN authentication
Accessing Web sites
Dial-Up connections
Intranet login
The server issues password to any body requesting for it.
The server poses the challenge for the password request.
The server requests for the password.
The server expects a clear text password initially.
A token is generated when a user has been successfully authenticated
This token is attached to the users session and will be destroyed once the session is terminated
This token is attached to the users session and will be destroyed after the user has logged out
The Kerberos system requires a Key Distribution Center (KDC) which is responsible for authenticating any network user, Computer or Service.
None
Finger prints
Retinal scan
Some times the DNA structure too to establish user Id
True
False
Advantage is that it is easy to remember passwords
Advantage is that it is easy to implement
Disadvantage is that it is difficult to implement
Disadvantage is that it is not secure
True
False
Loss of signal strength
Eavesdropping
Blackout
EMI
A computer on your network has crashed
Your router is unable to find a destination outside of your network
Your Web server has gone into a loop trying to service a client request.
You keyboard is no longer responding.
Ping to the server
Simulate a DDoS attack on that server
Simulate a DoS attack on the server
Check if all the patches and required antivirus software has been loaded o the server.
True
False
ARP
FTP
TFTP
DHCP
SLIP
PPTP
POP3
PPP
PPTP
L2TP
HTTP
NNTP
PPTP
IPSec
Kerberos
Certificate
IP
IPX
SNA
None of the above
There are web sites that keep updating vulnerability information for different platforms.
It is ideal to constantly browse these sites and keep checking if it applicable for the platform and applications housed in your web server.
Update virus definition files regularly.
None
Worms
Trojan horse
Boot Record virus
EXE file virus
Scan before downloading
Scan before sending
Scan before opening
Scan after receiving
25
26
27
Verifies if destination domain is self or not before transmitting a mail
Verifies if recipient is from local domain or not before receiving an email
Verifies if email is infected or not
None of the above