This CompTIA Security+ Practice Exam assesses key security concepts and practices, focusing on areas like Acceptable Use Policies, covert channels, RBAC, and log retention policies. Ideal for learners aiming to validate their cybersecurity skills.
DAC (Discretionary Access Control) list.
SAC (Subjective Access Control) list.
MAC (Mandatory Access Control) list.
RBAC (Role Based Access Control) list.
Rate this question:
File, printer, and mailbox roles
Sales, marketing, management, and production roles
User and workstation roles
Allow access and deny access roles
Rate this question:
. You should make use of the Role Based Access Control (RBAC) model.
You should make use of the Mandatory Access Control (MAC) model.
You should make use of the Rule Based Access Control (RBAC) model.
You should make use of the Discretionary Access Control (DAC) model.
Rate this question:
Server based access control
Rule based access control
Token based access control
Role based access control
All of the Above
Rate this question:
Both logon successes and logon failures
Only logon failures for non-existent users
Only logon success
Only logon failures
Rate this question:
A circuit-level firewall
A honeypot
A IDS
A system integrity verifier
Rate this question:
RBAC (Role Based Access Control)
DAC (Discretionary Access Control)
MAC (Mandatory Access Control)
All of the Above
None of the above.
Rate this question:
Sensitivity labels are based on a Mandatory Access Control (MAC) environment.
Access control lists are based on a Mandatory Access Control (MAC) environment.
Group membership is based on a Mandatory Access Control (MAC) environment.
Ownership is based on a Mandatory Access Control (MAC) environment.
Rate this question:
Authentication
Authorization
Certification
Accountability
Rate this question:
Something you have
Something you know
Something you are
All of the Above
None of the Above
Rate this question:
A workstation or system that generates a random challenge string that the user enters when prompted along with the proper PIN (Personal Identification Number).
A workstation or system that generates a random login ID that the user enters when prompted along with the proper PIN (Personal Identification Number).
A special hardware device that is used to generate random text in a cryptography system.
The authentication mechanism in the workstation or system does not determine if the owner should be authenticated.
Rate this question:
You should identify the Discretionary Access Control (DAC) access control model.
You should identify the Role Based Access Control (RBAC) access control model.
You should identify the Mandatory Access Control (MAC) access control model.
You should identify the Rule Based Access Control (RBAC) access control model.
None of the Above
Rate this question:
Based on sense of urgency from management
Based on tenure at the company
Needed to complete the task
That may be revealed to the public
All of the Above
Rate this question:
MACs (Mandatory Access Control)
RBACs (Role Based Access Control)
LBACs (List Based Access Control)
DACs (Discretionary Access Control)
Rate this question:
This is a feature of Discretionary Access Control (DAC).
This is a feature of Rule Based Access Control (RBAC).
This is a feature of Role Based Access Control (RBAC).
This is a feature of Mandatory Access Control (MAC).
Rate this question:
The authentication process is known as need to know.
The authentication process is known as decentralized management.
The authentication process is known as Discretionary Access Control (DAC).
The authentication process is known as single sign-on.
Rate this question:
You should identify the Biometric authentication model.
You should identify the Multifactor authentication model.
You should identify the Mutual authentication model.
You should identify the Tokens authentication model.
Rate this question:
Social Engineering attacks
Logical attacks
Physical attacks
Trojan Horse attacks
None of the Above
Rate this question:
RADIUS
PPTP
L2TP
IPSec
None of the Above
Rate this question:
The Discretionary Access Control (DAC) access control model would be most suitable.
The Rule Based Access Control (RBAC) access control model would be most suitable.
The Role Based Access Control (RBAC) access control model would be most suitable.
The Mandatory Access Control (MAC) access control model would be most suitable.
Rate this question:
Passwords
Tokens
Biometrics
Shared secrets
Rate this question:
DACs (Discretionary Access Control)
LBACs (List Based Access Control)
RBACs (Role Based Access Control)
MACs (Mandatory Access Control)
Rate this question:
Capabilities
Access control lists
Permission bits
Profiles
Rate this question:
Files that don't have an owner CANNOT be modified.
The administrator of the system is an owner of each object.
The operating system is an owner of each object.
Each object has an owner, which has full control over the object.
None of the Above
Rate this question:
To ensure proper connections.
To ensure tickets expire correctly.
To generate the seed value for the encryptions keys.
To benchmark and set the optimal encryption algorithm.
Rate this question:
One time password
Biometrics
Username and password
Token
Rate this question:
You should make use of the Kerberos authentication method.
You should make use of the Challenge Handshake Authentication Protocol (CHAP) authentication method.
You should make use of the Username/password authentication method
You should make use of the Multifactor authentication method.
Rate this question:
Use levels of security to classify users and data
Allow owners of documents to determine who has access to specific documents
Use access control lists which specify a list of authorized users
Use access control lists which specify a list of unauthorized users
Rate this question:
You should identify Mandatory Access Control (MAC).
You should identify Role Based Access Control (RBAC).
You should identify Discretionary Access Control (DAC).
You should identify List Based Access Control (LBAC).
Rate this question:
The tickets are digitally signed.
The tickets are used a token.
The tickets are encrypted.
The tickets are time stamped.
Rate this question:
Privilege
Subject
Sensitivity
Object
Rate this question:
It is very costly to set up.
It is not effective.
It cannot analyze encrypted information.
It is very costly to manage.
All of the Above
Rate this question:
The login should be the same as the domain account for authentication purposes
The application should not be deployed if it is not fully tested
It is not considered best practice to have a user remember multiple logins
It can be used as a backdoor into the company’s databases
Rate this question:
Lattice
Bell La-Padula
BIBA
Clark and Wilson
Rate this question:
RADIUS
PAP
MS-CHAP
CHAP
Rate this question:
IPSEC
TSTEC
PRVMIN
RBAC
Rate this question:
Retention policies
Administrator preferences
MTTF
MTTR
All of the Above
Rate this question:
Passwords must be changed at least once every 60 days, depending on your environment.
Passwords must not be the same as user id or login id.
Password aging must be enforced on all systems.
Password must be easy to memorize.
All of the Above
Rate this question:
Detecting performance anomalies that may be due to security breaches
Assuring that systems are working to their optimal capacity
Knowing when security scans are going to finish
Predicting the end of useful life for the firewall
All of the Above
Rate this question:
21
23
53
55
Rate this question:
Challenge Handshake Authentication Protocol (CHAP) is used to access multiple systems within a company.
Single Sign-on is used to access multiple systems within a company.
Kerberos is used to access multiple systems within a company.
Mandatory Access Control (MAC) is used to access multiple systems within a company.
Rate this question:
You should place a File and print server on the private network.
You should place a Remote Access Server (RAS) on the private network.
You should place an E-mail server on the private network.
You should place a Web server on the private network.
You should make use of the Mutual authentication method.
You should make use of the Biometric authentication method.
You should make use of the Username/password authentication method.
You should make use of the Multifactor authentication method.
Rate this question:
Only the administrators
Resource owners
End users
All of the Above
None of the Above
Rate this question:
1,024
32
16,777,216
65,535
Rate this question:
Self service password resets
Locally saved passwords
Multiple access methods
Synchronized passwords
Rate this question:
VPN (Virtual Private Network).
PPTP (Point-to-Point Tunneling Protocol).
One time password.
Complex password requirement.
Rate this question:
Most of the implementations use the x.500 directory model
Some of the implementations use default TCP ports 389 and 636
Some implementations use x.509 certificates for securing communications
All attributes will be encrypted
Quiz Review Timeline (Updated): Mar 19, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.