Full length Comptia Security+ Practice Exam. This is the second free mock exam at Proprofs. We suggest you do this exam after completing the free Security+ practice question available on the site. Take this exam like the real exam to see if you are completly prepared for the real exam. This FREE online Security+ practice test will help you pass See moreby familiarizing you with the material and the ensuring that you know the structure of the Security+ test. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.
Responsibilities attached to the role played by the user
Access Control list
Resource list
User Database
Rate this question:
PAP allows maximum security
CHAP allows maximum security
PAP is a two-way handshake
CHAP is a three-way handshake.
Rate this question:
User
Computer
Web site
Operating System
Rate this question:
Kerberos is ideal for WAN security
Kerberos uses a ticket to attach credentials to users.
Kerberos needs a certificate authority to be present in the network
Kerberos is ideally meant for LAN
Rate this question:
A Certificate can be issued by a third party only.
A Certificate enhances the credibility of the end object to which it has been assigned.
A Certificate when assigned to a user enhances user access permissions on the network resources for that user.
A Certificate requires a Certification authority to be generated.
A Certificate is used for secure authentication.
Rate this question:
Certificate Server
Administrator
Owner
Third party Certificate Server
Rate this question:
Username/Password
Smart Card
Certificate
Token
Rate this question:
True
False
Rate this question:
Certificate Service
IIS
RAS
None of the above
Rate this question:
Proxy
RAS
DNS
DHCP
Rate this question:
Encrypting passwords
Encrypting usernames
Encrypting data
Encrypting data as well as passwords.
Rate this question:
Ftp
Ping
IPCONFIG
Trace
Rate this question:
The servers� behavior would be erratic.
The user would not be able to access the Web Server.
All resources attached to the Web Server would stop functioning
The entire network stops functioning.
Rate this question:
True
False
Rate this question:
ICMP
IGMP
IGRP
EIGRP
Rate this question:
True
False
Rate this question:
PPP
RS232
SLIP
V35
Rate this question:
RAS
DHCP
HTTP
RADIUS
Rate this question:
It needs an independent administrator
It can be managed by the central administrator
It needs to be configured on the central server
None of the above
Rate this question:
25
20
110
119
Rate this question:
An email client can retrieve mails only from an email server
An email client needs a retrieval protocol as well as an email application
It is mandatory that emails are scanned if an email client has to be operational
None of the above
Rate this question:
It uses radio frequency for main communication.
Advanced phones use Infrared for data transfer.
Its reception/transmission range will depend upon the service providers� signal strength
Its reception/transmission range will depend upon the cellular devices� signal strength
Rate this question:
PC
Routers
Switches
None of the above.
Rate this question:
Physical layer
Datalink layer
Network Layer
None of the above
Rate this question:
Small range LAN
Remote control devices
Advanced cellular devices
Refrigerators
Rate this question:
Information presented by the Access List.
Information presented by the routing table.
Information presented by the header information of the incoming packets.
Information presented by the header information of the outgoing packets.
Rate this question:
NAT
PAT
MAC
DAC
Rate this question:
UDP
TCP
FTP
Rate this question:
True
False
Rate this question:
Administrator
Business owner
User
Government policies.
Rate this question:
Any any
Deny all
Permit any
None of the above
Rate this question:
Protocol information
Source address
Destination address
No of bytes in the header
Rate this question:
Block port numbers 20 and 21 on the external interface for incoming connections
Block port numbers 20 and 21 on the internal interface.
Block port numbers 67 and 68 on the external interface for incoming connections
Block port numbers 67 and 68 on the internal interface
Rate this question:
True
False
Rate this question:
Web servers should not have most restrictive permissions on resources that need not be accessible to the external user.
Web servers should have most restrictive permissions on resources that need not be accessible to the external user.
Verifying that only relevant resources can be accessible through URLs
Verify if all services have been updated with latest patches or service packs.
None of the above
Rate this question:
In this model the Database server is the core component.
In this model, the database client is the core component.
This is the most secure model for a database server.
This is the least secure model for hosting a database server.
Rate this question:
True
False
Rate this question:
Yes
No
Rate this question:
It offers 128-bit hash
It offers 256-bit hash
Its latest version is MD#5
Its latest version is MD#1
Rate this question:
Encryption
Digital signatures
Certificates
Tokens
Rate this question:
It is ideal security for emails
It can be used for Identification establishment.
It is an encryption method
It is an encryption standard
Rate this question:
True
False
Rate this question:
Prevent information modification during transmission.
Verification through check sum algorithms.
Verification through authentication
Verification through digital signatures.
Rate this question:
Setup networking standards
Propose and develop standards relating to computers, networks and Internet
Review security policies for banks
None of the above.
Rate this question:
It is a result of strong cryptography
It is a result of weak cryptography
It makes it impossible to retrieve clear text without the help of correct decoding tools.
It makes it impossible to retrieve clear text.
Requires extensive computing capability to decode.
Rate this question:
True
False
Rate this question:
3
5
4
0
Rate this question:
It is not reliable
Key distribution
Key generation
None of the above
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2022 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.