Comptia Security+ Practice Exam (3) Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.
The security administrator wants to stop a man-in-the-middle attack.
The security administrator wants to stop shoulder surfing.
The security administrator wants to stop dumpster diving.
The security administrator wants to stop phishing.
You should implement training and awareness strategy.
You should implement escorting of guests strategy.
You should implement badge security system strategy.
You should implement marking of documents strategy.
You should implement operating system patching instructions.
You should implement security awareness training.
You should implement risk assessment policies.
You should implement vulnerability testing techniques.
You should implement identity verification methods.
It will be efficient in an environment with a help desk whose personnel have a little training.
It will be efficient in an environment with committed information technology (IT) security staff.
It will be efficient in a public building that contains shared office space.
It will be efficient in a military facility with computer equipment containing biometrics.
It will be efficient in a locked, windowless building.
This is known as a Trojan horse.
This is known as a man-in-the-middle attack.
This is known as a phishing attack.
This is known as social engineering.
This is known as a back door.
This is known as password guessing.
This is known as man-in-the-middle.
This is known as social engineering.
It is an example of social engineering
It is an example of a vulnerability scan.
It is an example of a man in the middle attack.
It is an example of a penetration test.
Port scanner.
Map scanner.
Ping scanner.
Share scanner.
Installing a rootkit on the target system.
Checking the services file.
Enabling logging on the target system.
Running a port scan against the target system.
TCP (transmission Control Protocol) SYN (Synchronize) scan
TCP (transmission Control Protocol) connect scan
TCP (transmission Control Protocol) fin scan
TCP (transmission Control Protocol) null scan
You have to implement a host based intrusion detection system to address this problem.
You have to ensure that the user rights and security groups are changed.
You have to implement a host based intrusion prevention system to address this problem.
You have to ensure that the file level audit settings are changed.
You should identify printing as the function of the auditing record.
You should identify troubleshooting as the function of the auditing record.
You should identify investigations as the function of the auditing record.
You should identify performance as the function of the auditing record.
You should identify installing as the function of the auditing record.
You should identify stateful packet filtering.
You should identify host based intrusion detection.
You should identify network based intrusion detection.
You should identify file integrity auditing.
The Application will show the usage attempts that are not approved.
The Performance will show the usage attempts that are not approved.
The System will show the usage attempts that are not approved.
The Security will show the usage attempts that are not approved.
Auditing all system events is frequently disregarded.
Permitting auditing on the system is frequently disregarded.
Deciding the events that need to be audit is frequently disregarded.
Regularly reviewing event logs is frequently disregarded.
You should consider enabling auditing. Then you can set auditing to record the events.
You should consider enabling auditing. Then you can set auditing on the object and respond as alerts are generated.
You should consider setting auditing on the object and respond as alerts are produced.
You should consider enabling auditing. Then you can set auditing on objects and review event logs.
PPP (Point-to-Point Protocol)
SSL (Secure Sockets Layer)
L2TP (Layer Two Tunneling Protocol)
IPSec (Internet Protocol Security)
IPX
L2TP
PPTP
SSH
TCP (Transmission Control Protocol) port 635 and UDP (User Datagram Protocol) port 654
TCP (Transmission Control Protocol) port 749 and UDP (User Datagram Protocol) port 781
UDP (User Datagram Protocol) port 1701 and TCP (transmission Control Protocol) port 1723
TCP (Transmission Control Protocol) port 1812 and UDP (User Datagram Protocol) port 1813
PPP (Point-to-Point Protocol).
SLIP (Serial Line Internet Protocol).
L2TP (Layer Two Tunneling Protocol).
SMTP (Simple Mail Transfer Protocol).
PPTP (Point-to-Point Tunneling Protocol).
The perimeter router and firewall must allow inbound protocol number 51 for ESP (Encapsulating Security Payload) encapsulated IPSec (Internet Protocol Security) traffic
The perimeter router and firewall must allow inbound protocol number 49 for ESP (Encapsulating Security Payload) encapsulated IPSec (Internet Protocol Security) traffic
The perimeter router and firewall must allow inbound protocol numbers 50 and 51 for ESP (Encapsulating Security Payload) and All (Authentication Header) encapsulated IPSec (Internet Protocol Security) traffic
The perimeter router and firewall must allow inbound protocol numbers 52 and 53 for AH (Authentication Header) and ESP (Encapsulating Security Payload) encapsulated IPSec (Internet Protocol Security) traffic
ESP (Encapsulating Security Payload)
S/MIME (Secure Multipurpose Internet Mail Extensions)
IPSec (Internet Protocol Security)
IPv2 (Internet Protocol version 2)
PPP (Point-to-Point Protocol).
PPTP (Point-to-Point Tunneling Protocol).
SLIP (Serial Line Internet Protocol).
ESLIP (Encrypted Serial Line Internet Protocol).
IPSec (Internet Protocol Security), L2TP (Layer Two Tunneling Protocol), and SSL (Secure Sockets Layer)
IPSec (Internet Protocol Security), L2TP (Layer Two Tunneling Protocol), and PPP (Point-to-Point Protocol)
L2TP (Layer Two Tunneling Protocol), PPTP (Point-to-Point Tunneling Protocol), and SSL (Secure Sockets Layer)
PPTP (Point-to-Point Tunneling Protocol), L2TP (Layer Two Tunneling Protocol), and IPSec (Internet Protocol Security)
RADIUS (Remote Authentication Dial-in User Service) provides for a centralized user database.
RADIUS (Remote Authentication Dial-in User Service) provides for a decentralized user database.
No user database is required with RADIUS (Remote Authentication Dial-in User Service).
User database is replicated and stored locally on all remote systems.
Wait!
Here's an interesting quiz for you.