CompTIA Security+ Quiz
DMZ, Firewalls, Routers, Extranets, Intranets
Remote access, Ldap, ISA
Chap, Rbac, DoS
Ports, TCP, UDP
Rate this question:
For password creation
For CHAP authentication
To create a PKI for sharing on a network
To increase security, block and all unused ports
Rate this question:
80, 443, 23, 21,56 and 89
21, 25, 53, 80, 443 and 110
21, 1723, 1812, 80, 443 and 23
25, 21, 56, 80, 143 and 443
Rate this question:
Host web sites.
Install the latest security patches.
Performs harddisk scans with antivirus software.
Routes traffic from one network to another network.
Disk Operating System
Denial of System
Denial of Service
Death of System
The attacker ususe a sniffer to listen to and repeat messages.
A secret combination of keystrokes.
A non OS specific attack that uses a third party's network segment to overwhelm a host with a flood of ICMP packets.
Filter incoming packets for broadcast address.
Lies dormant until triggered by a specific event.
Breaks into system by guessing users password.
Acts as a storage device for PC.
Spreads from system to system by attaching itself to data or other files.
Exploits network vurnerabilities with the intent of propagating itself.
Lies dormant until triggered by a specific event.
Spreads from system to system by attaching itself to data or other files.
The attacker using a sniffer to listen to and repeat messages.
Don't open email from unknown sources.
Install the latest security updates.
Install antivirus software and maintain current signature updates.
Install and configuration of firewall software.
Denial Distributed of Service
Distributed Denial of Service.
Distributed Denial of System.
Disk Denial of Service.
Dictionary approach.
Birthday attack.
Password guessing.
Password attack.
Updates DNS software to latest version.
Displays the browser's address bar.
Disables source routing on all internet routers.
Attacker places himself between two communicating hosts and listens in on their session.
Attacker with a wireless notebook to explore wireless LAN's.
The attacker convinces victims that they're visiting a legitimate Web site when they are in fact visiting a site that has been created or modified by the attacker.
Attacker places himself between two communicating hosts and listens in on their session.
The attacker mainipulates the DNS server to redirect users to an attacker's server.
Attacker with a wireless notebook to explore wireless LAN's.
The attacker uses this method to corrupt the routing tables.
The attacker convinces victims that they're visiting a legitimate Web site when they are in fact visiting a site that has been created or modified by the attacker.
A directory where the certificates are held.
The attacker mainipulates the DNS server to redirect users to an attacker's server
MAC, BAC, SAC
MAC, DAC, RACK
MAC, DAC, RBAC
MAC RDAC, RMAC
Role Based Access Controller
Role Based Access Control
Role Base Access Controller
Role Base Access Control
Response hash, Challenge message, Success or failure.
Challenge message, Response hash, Resource and Server.
Challenge message, Response hash, Success or failure.
Success or failure, Challenge message, Response hash.
Symmetric, Asymmetric
PKI, Symmetric
Asymmetric, Kerberos
Host based IDS, Network based IDS
Asymmetric
Symmetric
Kerberos
Hashing
Asymmetric
Symmetric
Hashing
Kerberos
Ssl, Tls, Https
Sls, Tls, Https
Ssl, Tsl, Https
Ssl, Tls, Http
Ha, Psp
Ah, Esr
Ah, Esp
Pptp, L2pt
Translation of network address across the LAN and WAN.
Translation of network address across the LAN.
Provides remote offices or uses with secure access across a public internet to company office.
WAN protocol for Virtual email.
802.9x
802.11x
802.8x
802.12x
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.