The 'COMPTIA Security+ part 1' quiz assesses knowledge on network security protocols, steganography, TCP\/IP hijacking, backup integrity testing, network topology analysis, and penetration testing. It is designed for those preparing for the CompTIA Security+ certification, focusing on practical security issues and preventive measures.
ARP poisoning
Phishing
Shoulder surfing
Man-in-the-Middle
Rate this question:
Phishing
Adware
Botnet
Trojan
Rate this question:
Job rotation
Mandatory vacations
Least privilege
Separation of duties
Rate this question:
Two-factor authentication
Single sign-on
Smart card
Biometrics
Rate this question:
Trojan
Spam
Phishing
DNS poisoning
Rate this question:
Availability
Integrity
Non-repudiation
Confidentiality
Rate this question:
Verify system access
Facilitate penetration testing
Gain system access
Sniff network passwords
Rate this question:
Enforce Kerberos
Deploy smart cards
Time of day restrictions
Access control lists
Rate this question:
One
Two
Five
Seven
Rate this question:
Certificate Revocation List
Certificate Suspension
Recovery agent
Certificate Authority
Rate this question:
Worm
Rootkit
Trojan
Virus
Rate this question:
Change management
Secure disposal
Password complexity
Chain of custody
Rate this question:
ACL
Account expiration
Time of day restrictions
Logical tokens
Rate this question:
Mandatory Access Control (MAC)
Rule-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
Rate this question:
Replay attacks
Phishing
Man-in-the-middle attacks
Shoulder surfing
Rate this question:
Privilege escalation
Botnet
Adware
Spyware
Rate this question:
S/MIME
SMTP
L2TP
VPN
Rate this question:
Rootkit
Adware
Spyware
Spam
Rate this question:
Removal
Containment
Recovery
Monitor
Rate this question:
Antivirus
Content filter
Firewall
Proxy server
Rate this question:
Trojan
Worm
Steganography
Virus
Rate this question:
Most privilege
Least privilege
Rule based
Role based
Rate this question:
Attacker privilege escalation
Installation of a back door
Denial of Service (DoS)
Use of default passwords
Rate this question:
DLL injection
DDoS attack
DNS poisoning
ARP poisoning
Rate this question:
VLANs
NAT
Access lists
Intranet
Rate this question:
Network intrusion detection
Patch management
Firewall configuration
Antivirus selection
Rate this question:
NIPS
Honeypot
DMZ
NIDS
Rate this question:
RAS and username/password
RADIUS and L2TP
LDAP and WPA
Iris scan and proximity card
Rate this question:
Steganography
Worm
Trojan Horse
Virus
Rate this question:
Vulnerability scanner
NIPS
Protocol analyzer
Network mapper
Rate this question:
IP spoofing
MAC filtering
SSID spoofing
Closed network
Rate this question:
DDoS
Privilege escalation
Disclosure of PII
Single point of failure
Rate this question:
HIDS log
Security log
Firewall log
System log
Rate this question:
When the technician suspects that weak passwords exist on the network
When the technician is trying to guess passwords on a network
When the technician has permission from the owner of the network
When the technician is war driving and trying to gain access
Rate this question:
Proxy server
Honeypot
Internet content filter
Firewall
Rate this question:
Reformatting
Destruction
Sanitization
Deleting
Rate this question:
The key owner has exclusive access to the private key
Everyone has access to the private key on the CA
Only the CA has access to the private key
The key owner and a recipient of an encrypted email have access to the private key
Rate this question:
Intrusion detection
Virtualization
Kiting
Cloning
Rate this question:
DMZ
VLAN
NIDS
NAT
Rate this question:
Patch
Hotfix
Security roll-up
Service pack
Rate this question:
Spanning port
Subnetting
VLAN
NAT
Rate this question:
By conducting another backup
By using software to recover deleted files
By restoring part of the backup
By reviewing the written procedures
Rate this question:
Honeynet
DMZ
Honeypot
VLAN
Rate this question:
RADIUS
Password cracker
Port scanner
Man-in-the-middle attack
Rate this question:
Rogue access points
War driving
Weak encryption
Session hijacking
Rate this question:
Install a word processor
Run the latest spyware
Apply the baseline configuration
Run OS updates
Rate this question:
A port monitor utility shows that there are many connections to port 80 on the Internet facing web server
A performance monitor indicates a recent and ongoing drop in speed, disk space or memory utilization from the baseline
A protocol analyzer records a high number of UDP packets to a streaming media server on the Internet
The certificate for one of the web servers has expired and transactions on that server begins to drop rapidly
Rate this question:
Internet content filter
Proxy
Protocol analyzer
NIDS
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.