Comptia Security+ Practice Exam (3)
Full length Comptia Security+ Practice Exam. Take this exam like thereal exam to see if you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of thepressures of the real exam. The practice test is designed to reflectthe final exam.
HTTPS (Hypertext Transfer Protocol over SSL).
Cookies.
HTTP (Hypertext Transfer Protocol)/l.0 Caching.
VCard v3.0.
Rate this question:
This is known as a Trojan horse.
This is known as a man-in-the-middle attack.
This is known as a phishing attack.
This is known as social engineering.
Rate this question:
This is known as a back door.
This is known as password guessing.
This is known as man-in-the-middle.
This is known as social engineering.
Rate this question:
Text files.
Image files.
Sound files.
Executable files.
Rate this question:
You should implement training and awareness strategy.
You should implement escorting of guests strategy.
You should implement badge security system strategy.
You should implement marking of documents strategy.
Rate this question:
S/MIME
BIND
DES
SSL
Rate this question:
A shared password.
A certificate signed by a trusted root CA (Certificate Authority).
An address on the same subnet.
A common operating system.
Rate this question:
Digital certificates
Cookies
ActiveX controls
Web server cache
Rate this question:
The security administrator wants to stop a man-in-the-middle attack.
The security administrator wants to stop shoulder surfing.
The security administrator wants to stop dumpster diving.
The security administrator wants to stop phishing.
Rate this question:
You have to implement a host based intrusion detection system to address this problem.
You have to ensure that the user rights and security groups are changed.
You have to implement a host based intrusion prevention system to address this problem.
You have to ensure that the file level audit settings are changed.
Rate this question:
PPP (Point-to-Point Protocol).
SLIP (Serial Line Internet Protocol).
L2TP (Layer Two Tunneling Protocol).
SMTP (Simple Mail Transfer Protocol).
PPTP (Point-to-Point Tunneling Protocol).
Rate this question:
SSL (Secure Sockets Layer) alert protocol.
SSL (Secure Sockets Layer) change cipher spec protocol.
SSL (Secure Sockets Layer) record protocol.
SSL (Secure Sockets Layer) handshake protocol.
Rate this question:
S/MIME (Secure Multipurpose Internet Mail Extensions)
XML (Extensible Makeup Language)
SSL (Secure Sockets Layer)
SMTP (Simple Mail Transfer Protocol)
Rate this question:
PPP (Point-to-Point Protocol).
PPTP (Point-to-Point Tunneling Protocol).
SLIP (Serial Line Internet Protocol).
ESLIP (Encrypted Serial Line Internet Protocol).
Rate this question:
It is known as dual control.
It is known as need to know.
It is known as separation of duties.
It is known as acceptable use.
Rate this question:
Packet sniffing.
Port scanning.
Cryptanalysis.
Reverse engineering.
Rate this question:
Installing a rootkit on the target system.
Checking the services file.
Enabling logging on the target system.
Running a port scan against the target system.
Rate this question:
It will be efficient in an environment with a help desk whose personnel have a little training.
It will be efficient in an environment with committed information technology (IT) security staff.
It will be efficient in a public building that contains shared office space.
It will be efficient in a military facility with computer equipment containing biometrics.
It will be efficient in a locked, windowless building.
Rate this question:
It is an example of social engineering
It is an example of a vulnerability scan.
It is an example of a man in the middle attack.
It is an example of a penetration test.
Rate this question:
TCP (Transmission Control Protocol) port 22
UDP (User Datagram Protocol) port 69
TCP (Transmission Control Protocol) port 179
UDP (User Datagram Protocol) port 17
Rate this question:
RADIUS (Remote Authentication Dial-in User Service) provides for a centralized user database.
RADIUS (Remote Authentication Dial-in User Service) provides for a decentralized user database.
No user database is required with RADIUS (Remote Authentication Dial-in User Service).
User database is replicated and stored locally on all remote systems.
Rate this question:
DES (Data Encryption Standard).
S-Telnet.
SSH (Secure Shell).
PKI (Public Key Infrastructure).
Rate this question:
You should install a security token.
You should install a Symmetric key.
You should install a Digital certificate.
You should install a 3DES encryption.
Rate this question:
ESP (Encapsulating Security Payload)
S/MIME (Secure Multipurpose Internet Mail Extensions)
IPSec (Internet Protocol Security)
IPv2 (Internet Protocol version 2)
Rate this question:
Non-repudiation protects the confidentiality of data.
Encryption protects the confidentiality of data.
Hashing protects the confidentiality of data
Digital signatures protect the confidentiality of data.
Rate this question:
You can ensure that regular updates are executed.
You can ensure that the preview screens are disabled.
You can ensure that the spam and anti-virus filters are used.
You can ensure that the e-mail client characteristics are disabled.
Rate this question:
Spammers can utilize the relay.
The relay limits access to specific users.
The relay restricts the types of e-mail that maybe sent.
The relay restricts spammers from gaining access.
Rate this question:
UDP (User Datagram Protocol) transport layer protocol and port 80
TCP (Transmission Control Protocol) transport layer protocol and port 80
TCP (Transmission Control Protocol) transport layer protocol and port 443
UDP (User Datagram Protocol) transport layer protocol and port 69
Rate this question:
Encryption.
Their location on the web server.
SSL (Secure Sockets Layer).
Digital signatures.
Rate this question:
Use its digital certificate to establish its identity to the browser.
Validate the user by checking the CRL (Certificate Revocation List).
Request the user to produce the CRL (Certificate Revocation List).
Display the requested page on the browser, then provide its IP (Internet Protocol) address for verification
Rate this question:
The user's browser setting.
The meta tag.
The condition of the sandbox.
The negotiation between the client and the server.
Rate this question:
A possible cause could be that the administrator account was not protected.
A possible cause could be that the remote access to the install directory of the e-mail applications was not removed.
A possible cause could be that anonymous relays have not been disabled.
A possible cause could be that the X.400 connectors have not been password protected.
Rate this question:
Hoaxes can create as much damage as a real virus.
Hoaxes are harmless pranks and should be ignored
Hoaxes can help educate user about a virus.
Hoaxes carry a malicious payload and can be destructive.
Rate this question:
E-mail hoaxes create unnecessary e-mail traffic and panic in non-technical users.
E-mail hoaxes take up large amounts of server disk space.
E-mail hoaxes can cause buffer overflows on the e-mail server.
E-mail hoaxes can encourage malicious users.
Rate this question:
TCP (transmission Control Protocol) SYN (Synchronize) scan
TCP (transmission Control Protocol) connect scan
TCP (transmission Control Protocol) fin scan
TCP (transmission Control Protocol) null scan
Rate this question:
Authorization
Non-repudiation
Integrity
Cryptographic mapping
Rate this question:
Theft of root user credentials.
Disconnection from the file server.
Hostile code delivered by file transfer.
Slow Internet connections.
Loss of email privileges.
Rate this question:
The Application will show the usage attempts that are not approved.
The Performance will show the usage attempts that are not approved.
The System will show the usage attempts that are not approved.
The Security will show the usage attempts that are not approved.
Rate this question:
Auditing all system events is frequently disregarded.
Permitting auditing on the system is frequently disregarded.
Deciding the events that need to be audit is frequently disregarded.
Regularly reviewing event logs is frequently disregarded.
Rate this question:
Current user account
Administrator account
Guest account
System account
Rate this question:
You should consider enabling auditing. Then you can set auditing to record the events.
You should consider enabling auditing. Then you can set auditing on the object and respond as alerts are generated.
You should consider setting auditing on the object and respond as alerts are produced.
You should consider enabling auditing. Then you can set auditing on objects and review event logs.
Rate this question:
DoS (Denial of Service).
Processor under utilization.
Reduction in hard drive space requirements.
Increased network throughput.
Rate this question:
IPSec (Internet Protocol Security)
HTTP (Hypertext Transfer Protocol)
SSL (Secure Sockets Layer)
VPN (Virtual Private Network)
Rate this question:
You should identify stateful packet filtering.
You should identify host based intrusion detection.
You should identify network based intrusion detection.
You should identify file integrity auditing.
Rate this question:
IPSec (Internet Protocol Security), L2TP (Layer Two Tunneling Protocol), and SSL (Secure Sockets Layer)
IPSec (Internet Protocol Security), L2TP (Layer Two Tunneling Protocol), and PPP (Point-to-Point Protocol)
L2TP (Layer Two Tunneling Protocol), PPTP (Point-to-Point Tunneling Protocol), and SSL (Secure Sockets Layer)
PPTP (Point-to-Point Tunneling Protocol), L2TP (Layer Two Tunneling Protocol), and IPSec (Internet Protocol Security)
Rate this question:
The PPTP will enable a secure connection.
The IPSec will enable a secure connection.
The PPPoE will enable a secure connection.
The L2TP will enable a secure connection.
Rate this question:
TCP (Transmission Control Protocol) port 110 to all inbound and outbound connections.
UDP (User Datagram Protocol) port 110 to all inbound connections.
UDP (User Datagram Protocol) port 25 to all inbound connections
TCP (Transmission Control Protocol) port 25 to all inbound and outbound connections.
Rate this question:
It will reply on L2F.
It will reply on IPSec.
It will reply on SSH.
It will reply on SSL.
Rate this question:
Quiz Review Timeline (Updated): Mar 17, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.