Comptia Security+ Practice Exam- 1
Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.
Authentication
Authorization
Certification
Accountability
Rate this question:
Server based access control
Rule based access control
Token based access control
Role based access control
All of the Above
Rate this question:
Something you have
Something you know
Something you are
All of the Above
None of the Above
Rate this question:
Something you are
Something you know
Something you have
All of the Above
None of the Above
Rate this question:
Social Engineering attacks
Logical attacks
Physical attacks
Trojan Horse attacks
None of the Above
Rate this question:
Both logon successes and logon failures
Only logon failures for non-existent users
Only logon success
Only logon failures
Rate this question:
DAC (Discretionary Access Control) list.
SAC (Subjective Access Control) list.
MAC (Mandatory Access Control) list.
RBAC (Role Based Access Control) list.
Rate this question:
File, printer, and mailbox roles
Sales, marketing, management, and production roles
User and workstation roles
Allow access and deny access roles
Rate this question:
IPSEC
TSTEC
PRVMIN
RBAC
Rate this question:
Passwords must be changed at least once every 60 days, depending on your environment.
Passwords must not be the same as user id or login id.
Password aging must be enforced on all systems.
Password must be easy to memorize.
All of the Above
Rate this question:
Logical attacks
Physical attacks
Trojan Horse attacks
Social Engineering attacks
None of the Above
Rate this question:
CORBA
IPSec
PPTP
DCOM
Both A & D
Rate this question:
It is an example of Rule Based Access Control (RBAC).
It is an example of Mandatory Access Control (MAC).
It is an example of Role Based Access Control (RBAC).
It is an example of Discretionary Access Control (DAC).
RBAC (Role Based Access Control)
DAC (Discretionary Access Control)
MAC (Mandatory Access Control)
All of the Above
None of the above.
Rate this question:
This is a feature of Discretionary Access Control (DAC).
This is a feature of Rule Based Access Control (RBAC).
This is a feature of Role Based Access Control (RBAC).
This is a feature of Mandatory Access Control (MAC).
Rate this question:
VPN (Virtual Private Network).
PPTP (Point-to-Point Tunneling Protocol).
One time password.
Complex password requirement.
Rate this question:
Passwords
Tokens
Biometrics
Shared secrets
Rate this question:
All that is expressly permitted is forbidden
All that is not expressly permitted is not forbidden
All that is not expressly permitted is forbidden
Both A and B
No Answer is Correct
Rate this question:
Mandatory controls
Discretionary controls
Secret controls
Corrective controls
Non of the Above
Rate this question:
Java Applet
CGI
Sandbox
Authenticode
All of the Above
Rate this question:
Detecting performance anomalies that may be due to security breaches
Assuring that systems are working to their optimal capacity
Knowing when security scans are going to finish
Predicting the end of useful life for the firewall
All of the Above
Rate this question:
Retention policies
Administrator preferences
MTTF
MTTR
All of the Above
Rate this question:
Rule based access control
Lattice based access control
Directory based access control
ID based access control
All of the Above
Rate this question:
Only the administrators
Resource owners
End users
All of the Above
None of the Above
Rate this question:
RADIUS
PAP
MS-CHAP
CHAP
Rate this question:
Sensitivity labels are based on a Mandatory Access Control (MAC) environment.
Access control lists are based on a Mandatory Access Control (MAC) environment.
Group membership is based on a Mandatory Access Control (MAC) environment.
Ownership is based on a Mandatory Access Control (MAC) environment.
Rate this question:
To ensure proper connections.
To ensure tickets expire correctly.
To generate the seed value for the encryptions keys.
To benchmark and set the optimal encryption algorithm.
Rate this question:
The authentication process is known as need to know.
The authentication process is known as decentralized management.
The authentication process is known as Discretionary Access Control (DAC).
The authentication process is known as single sign-on.
Rate this question:
The login should be the same as the domain account for authentication purposes
The application should not be deployed if it is not fully tested
It is not considered best practice to have a user remember multiple logins
It can be used as a backdoor into the company’s databases
Rate this question:
Based on sense of urgency from management
Based on tenure at the company
Needed to complete the task
That may be revealed to the public
All of the Above
Rate this question:
. You should make use of the Role Based Access Control (RBAC) model.
You should make use of the Mandatory Access Control (MAC) model.
You should make use of the Rule Based Access Control (RBAC) model.
You should make use of the Discretionary Access Control (DAC) model.
Rate this question:
The tickets are digitally signed.
The tickets are used a token.
The tickets are encrypted.
The tickets are time stamped.
Rate this question:
You should identify the Biometric authentication model.
You should identify the Multifactor authentication model.
You should identify the Mutual authentication model.
You should identify the Tokens authentication model.
Rate this question:
21
23
53
55
Rate this question:
Non-essential services are often appealing to attackers since less bandwidth is used.
Non-essential services are often appealing to attackers since the surface area for the attack is reduced.
Non-essential services are often appealing to attackers since root level access is offered.
Non-essential services are often appealing to attackers since attacks are maintained that go unnoticed.
Non-essential services are often appealing to attackers since it's not typically configured correctly or secured.
Rate this question:
Privilege
Subject
Sensitivity
Object
Rate this question:
RADIUS
PPTP
L2TP
IPSec
None of the Above
Rate this question:
The Discretionary Access Control (DAC) access control model would be most suitable.
The Rule Based Access Control (RBAC) access control model would be most suitable.
The Role Based Access Control (RBAC) access control model would be most suitable.
The Mandatory Access Control (MAC) access control model would be most suitable.
Rate this question:
You should identify Mandatory Access Control (MAC).
You should identify Role Based Access Control (RBAC).
You should identify Discretionary Access Control (DAC).
You should identify List Based Access Control (LBAC).
Rate this question:
It is known as the TCP/IP hijacking attack.
It is known as the Man in the middle attack.
It is known as the Replay attack.
It is known as the Back door attack
Rate this question:
The Biometric authentication best illustrates this scenario.
The Kerberos authentication best illustrates this scenario.
The Mutual authentication best illustrates this scenario.
The Multifactor authentication best illustrates this scenario.
Rate this question:
1,024
32
16,777,216
65,535
Rate this question:
Sensitivity labels
Group membership
Ownership
Access control lists
Rate this question:
Self service password resets
Locally saved passwords
Multiple access methods
Synchronized passwords
Rate this question:
Challenge Handshake Authentication Protocol (CHAP) is used to access multiple systems within a company.
Single Sign-on is used to access multiple systems within a company.
Kerberos is used to access multiple systems within a company.
Mandatory Access Control (MAC) is used to access multiple systems within a company.
Rate this question:
Based on labels
Based on flows
Hierarchical
All of the Above
All equal
Rate this question:
Audit log and system log
Hard disk space
Network counters and access denied errors
Network counters
Rate this question:
DACs (Discretionary Access Control)
LBACs (List Based Access Control)
RBACs (Role Based Access Control)
MACs (Mandatory Access Control)
Rate this question:
Quiz Review Timeline (Updated): May 28, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.