Sec+ study guide C assesses knowledge in IT security, focusing on password policies, server utilization, SQL injections, DDoS threats, and logic bombs. It prepares users for real-world cybersecurity challenges and aligns with CompTIA Security+ standards.
Computers must be configured for automated patch management
Computer media must be sanitized.
Default passwords must be changed once
Computers must be tested against known TCP/IP vulnerabilities.
Rate this question:
If the physical server crashes, all of the local virtual servers go offline immediately
If the physical server crashes, all of the physical servers nearby go offline immediately.
If a virtual server crashes, all of the virtual servers go offline immediately.
If a virtual server crashes, all of the physical servers go offline immediately
Rate this question:
Trojan
Worm
Botnet
Logic bomb
Rate this question:
Viruses
Worms
Botnets
Trojans
Rate this question:
User
System
Help desk
Owner
Rate this question:
Cryptography
Digital signature
Hashing
Steganography
Rate this question:
Weak passwords
Expired passwords
Locked passwords
Backdoor passwords
Rate this question:
Combination locks and key locks
Smartcard and proximity readers
Magnetic lock and pin
Biometric reader and smartcard
Rate this question:
User authentication
Need-to-know
Least privilege
Job role
Rate this question:
Mantrap
Security badges
Hardware locks
Token access
Rate this question:
A S/MIME buffer overflow
A POP3 protocol exception
DNS poisoning
A SMTP open relay
Rate this question:
Fault tolerance.
Key recovery.
Data recovery.
Integrity.
Rate this question:
Reformat the hard drives once.
Use a certified wipe program to erase data
Install antivirus on the drives
Run anti-spyware on the drives
Rate this question:
At time of hire
At time of first correspondence
At time of departure
At time of first system login
Rate this question:
A security template
A service pack
A patch
A hotfix
Rate this question:
Antivirus
Pop-up blocker
Anti-spyware
Personal software firewall
Rate this question:
Spyware
Trojan
Privilege escalation
DoS
Rate this question:
Accept the risk
Mitigate the risk
Reject the risk
Run a new risk assessment
Rate this question:
Install a repeater
Uninterruptible power supply (UPS)
Faraday cage
Faraday cage
Rate this question:
The remote PC has a spam slave application running and the local PCs have a spam master application running
The remote PC has a zombie master application running and the local PCs have a zombie slave application running.
The remote PC has a spam master application running and the local PCs have a spam slave application running
The remote PC has a zombie slave application running and the local PCs have a zombie master application running
Rate this question:
Install a network operating system on new equipment.
Create a virtual server on existing equipment
Install a network operating system on existing equipment
Create a virtual server on new equipment
Rate this question:
Piggybacking
Social engineering
Dumpster diving
Shoulder surfing
Rate this question:
Monitoring and acceptance
Evaluation and assessment
Assessment and eradication
Mitigation and repudiation
Rate this question:
Digital signature
Internet key exchange
Certificate authority
Symmetric key
Rate this question:
Updating the firewall configuration to include the patches
Running a NIDS report to list the remaining vulnerabilities
Auditing for the successful application of the patches
Backing up the patch file executables to a network share
Rate this question:
L2TP
SSH
SSL
HTTP
Rate this question:
Signature based HIDS.
Pop-up blocker applications.
Antivirus applications.
Rootkit detection applications.
Rate this question:
Backup all data at a preset interval to tape and store those tapes at a sister site across the street.
Backup all data at a preset interval to tape and store those tapes at a sister site in another city.
Backup all data at a preset interval to removable disk and store the disk in a safety deposit box at the administrators home
Backup all data at a preset interval to removable disk and store the disk in a fireproof safe in the buildings basement
Rate this question:
Penetration testing
Protocol analyzers
Port scanners
Vulnerability testing
Rate this question:
False negative.
False positive.
True negative
True positive
Rate this question:
Install multiple high end servers, sharing a clustered network operating system.
Install a single low end server, running multiple virtual servers
Install a single high end server, running multiple virtual servers.
Install multiple low end servers, each running a network operating system.
Rate this question:
A patch in a service pack fixes the issue, but too many extra patches are included.
A patch is not available and workarounds do not correct the problem
A patch is available, but has not yet been tested in a production environment.
A patch is too large to be distributed via a remote deployment tool.
Rate this question:
Log on only as the administrator
Install only needed software
Check the logs regularly.
Report all security incidents.
Rate this question:
RADIUS encrypts client-server negotiation dialog.
RADIUS is a remote access authentication service.
TACACS encrypts client-server negotiation dialog.
TACACS is a remote access authentication service.
Rate this question:
Netops
Lanman.
Netstat.
Ipconfig /all.
Rate this question:
File integrity auditing
Host based intrusion detection
Network based intrusion detection
Stateful packet filtering
Rate this question:
Fuzzing
Vampire tap
Crosstalk
Refraction
Rate this question:
Applying security templates
Running weekly spyware applications.
Network-based patch management.
Disabling all non-required services
Rate this question:
Remote access user connecting via SSL VPN
Office laptop connected to the enterprise LAN
Remote access user connecting via corporate dial-in server
Office laptop connected to a homeusers network
Rate this question:
Where the ARO equals the SLE.
The organization willmitigatE.
Where the ALE is lower than the SLE.
The organization will accept.
Rate this question:
PPTP
IPSec
L2TP
PPPoE
Rate this question:
Review security access logs
A networkmapper
A protocol analyzer
Review DNS logs
Rate this question:
Near a fiber optic cable entrance.
Near a shared LCD screen
Near a power line.
Near a high end server.
Rate this question:
NTLM
AES
OVAL
Kerberos
Rate this question:
S/MIME
SSH
3DES
IPSec
Rate this question:
Eradication.
Repudiation.
Recovery.
Containment.
Rate this question:
Replay
Spoofing
TCP/IP hijacking
Man-in-the-middle
Rate this question:
Before initial configuration
Before loading the OS
After a user logs in
After initial configuration
Rate this question:
Quiz Review Timeline (Updated): Jan 25, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.