Quiz On CompTIA Security+ Certification! Trivia Questions

20 Questions | Total Attempts: 232

SettingsSettingsSettings
Quiz On CompTIA Security+ Certification! Trivia Questions - Quiz

Are you looking for a quiz to help you in preparation for the CompTIA Security+ Certification? If so, the questionnaire below is precisely what you may need to refresh your understanding before the significant exam is upon us. How about you give it a shot and get to see how well you will do. All the best revising and for your exam too!


Questions and Answers
  • 1. 
    Which of the following access control models enables a person who creates or owns objects to define permissions to access those objects?
    • A. 

      Mandatory access control model

    • B. 

      Rule-based access control model

    • C. 

      Role-based access control model

    • D. 

      Discretionary access control model

  • 2. 
    During which type of assessment would penetration testers not have any knowledge about the network and network defenders have no knowledge of the test itself?
    • A. 

      Black box test

    • B. 

      Blind test

    • C. 

      Double-blind test

    • D. 

      Gray box test

  • 3. 
    Which of the following processes is concerned with validating credentials?
    • A. 

      Authorization

    • B. 

      Authentication

    • C. 

      Auditing

    • D. 

      Accountability

  • 4. 
    Your organization is concerned that employees might e-mail proprietary information to themselves at their private addresses. Which of the following would be most effective at catching that particular effort?
    • A. 

      Antispam filter

    • B. 

      Content filter

    • C. 

      Caching proxy server

    • D. 

      Firewall

  • 5. 
    Which of the following methods of log management involves visiting each individual host to review its log files?
    • A. 

      Centralized

    • B. 

      SIEM

    • C. 

      Decentralized

    • D. 

      Syslog

  • 6. 
    You are trying to determine the appropriate level of high availability for a server. The server must be available on a constant basis, and downtime in a given year cannot exceed 1 hour. It normally takes you about 45 minutes to bring down and restart the server for maintenance. Which of the following reflects the level of availability you require?
    • A. 

      99.999 percent availability

    • B. 

      99.9 percent availability

    • C. 

      99.99 percent availability

    • D. 

      99 percent availability

  • 7. 
    Which of the following ports would be most likely to allow secure remote access into a system within a data center?
    • A. 

      UDP port 53

    • B. 

      TCP port 1701

    • C. 

      UDP port 123

    • D. 

      TCP port 443

  • 8. 
    Which of the following secure protocols protects traffic during transmission and uses TCP port 443?
    • A. 

      SCP

    • B. 

      SSH

    • C. 

      TLS

    • D. 

      SSL

    • E. 

      TFTP

  • 9. 
    All of the following are valid methods to secure static hosts in an organization, except:
    • A. 

      Layered security

    • B. 

      Network segmentation

    • C. 

      Application level firewalls

    • D. 

      User-dependent security

  • 10. 
    Wissa is updating a printer driver on a Windows system. She downloads the latest driver from the manufacturer's Web site. When installing the driver, Windows warns that the driver is unsigned. To which of the following threats is Wissa exposing her system?
    • A. 

      Man-in-the-middle

    • B. 

      Version control

    • C. 

      Refactoring

    • D. 

      Shimming

  • 11. 
    Which of the following types of factors could be used to describe a fingerprint-based method of logging in and authenticating to a touchscreen device?
    • A. 

      Something you know.

    • B. 

      Something you have.

    • C. 

      Something you are.

    • D. 

      Something you do.

  • 12. 
    Which of the following technologies allows devices to communicate with each other at very close range through radio signals by using a special chip implanted in the device, and may be vulnerable to eavesdropping and man-in-the-middle attacks?
    • A. 

      802.11 wireless

    • B. 

      Bluetooth

    • C. 

      Near-field communication (NFC)

    • D. 

      Infrared

  • 13. 
    Which of the following is an application designed to create and initiate files on a host to provide a fully functional virtual machine?
    • A. 

      Host operating system

    • B. 

      Hypervisor

    • C. 

      Guest operating system

    • D. 

      Load balancer

  • 14. 
    How many rounds does DES perform when it encrypts plaintext?
    • A. 

      16

    • B. 

      32

    • C. 

      64

    • D. 

      128

  • 15. 
    Which of the following secure e-mail protocols is carried over an SSL or TLS connection and uses TCP port 993?
    • A. 

      SMTP

    • B. 

      POP3

    • C. 

      IMAPS

    • D. 

      IMAP4

  • 16. 
    Which of the following are true statements regarding the relationships of functionality, security, and available resources?
    • A. 

      As functionality increases, security increases.

    • B. 

      As security increases, functionality decreases.

    • C. 

      As resources increase, security decreases but functionality decreases.

    • D. 

      As resources decrease, both functionality and security decrease.

  • 17. 
    During which stage of a secure development model would you normally find steps such as requirements gathering, analysis, and diagram development?
    • A. 

      Security testing

    • B. 

      Secure design

    • C. 

      Security requirements

    • D. 

      Secure implementation

  • 18. 
    Risk assessment means evaluating which of the following elements?
    • A. 

      Probability

    • B. 

      Threat

    • C. 

      Vulnerability

    • D. 

      Impact

  • 19. 
    Which of the following is a protocol used to obtain the status of digital certificates in public keys?
    • A. 

      DHE

    • B. 

      RSA

    • C. 

      OCSP

    • D. 

      ECC

  • 20. 
    All of the following are supporting elements of authorization, except:
    • A. 

      Credential validation

    • B. 

      Principle of least privilege

    • C. 

      Separation of duties

    • D. 

      Rights, permissions, and privileges

Back to Top Back to top