Comptia Security+ Practice Exam- 1
Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.
IPSEC
TSTEC
PRVMIN
RBAC
Rate this question:
Bootp
Tftp
Sunrpc
All of the Above
No Answer is Correct
Rate this question:
Retention policies
Administrator preferences
MTTF
MTTR
All of the Above
Rate this question:
Server based access control
Rule based access control
Token based access control
Role based access control
All of the Above
Rate this question:
The use of tokens
The use of profiles
The use of information flow labels
The use of data flow diagrams
Rate this question:
Rule based access control
Lattice based access control
Directory based access control
ID based access control
All of the Above
Rate this question:
Objects
Scripts
Factors
Models
Both A and B
Rate this question:
All that is expressly permitted is forbidden
All that is not expressly permitted is not forbidden
All that is not expressly permitted is forbidden
Both A and B
No Answer is Correct
Rate this question:
Privilege
Subject
Sensitivity
Object
Rate this question:
Mandatory controls
Discretionary controls
Secret controls
Corrective controls
Non of the Above
Rate this question:
Preventive controls
Need-to-know controls
Mandatory adjustable controls
All of the Above
None of the Above
Rate this question:
Something you have
Something you know
Something you are
All of the Above
None of the Above
Rate this question:
Something you are
Something you know
Something you have
All of the Above
None of the Above
Rate this question:
Passwords must be changed at least once every 60 days, depending on your environment.
Passwords must not be the same as user id or login id.
Password aging must be enforced on all systems.
Password must be easy to memorize.
All of the Above
Rate this question:
Password history is used.
Password reuse is not allowed.
Any password used must not be word found in a dictionary.
All of the Above
None of the Above
Rate this question:
Social Engineering attacks
Logical attacks
Physical attacks
Trojan Horse attacks
None of the Above
Rate this question:
Logical attacks
Physical attacks
Trojan Horse attacks
Social Engineering attacks
None of the Above
Rate this question:
RADIUS
PPTP
L2TP
IPSec
None of the Above
Rate this question:
A Network Access Server
The end user
The authentication server
All of the Above
None of the Above
Rate this question:
Host-based
Identity-based
Signature-based
Network-based
Rate this question:
It is very costly to set up.
It is not effective.
It cannot analyze encrypted information.
It is very costly to manage.
All of the Above
Rate this question:
Telnet
POP
FTP
SSH
All of the Above
Rate this question:
CORBA
IPSec
PPTP
DCOM
Both A & D
Rate this question:
PPTP
IPSEC
OSPF
L2TP
None of the Above
Rate this question:
PPTP
L2TP
OSPF
IPSEC
All of the Above
Rate this question:
TLS
SSH
SHTTP
SET
All of the Above
Rate this question:
JVM
Bytecode
Interpreter
Just-in-time compiler
All of the Above
Rate this question:
Java Applet
CGI
Sandbox
Authenticode
All of the Above
Rate this question:
RADIUS
PAP
MS-CHAP
CHAP
Rate this question:
Virus
Worm
Trojan horse
Firewall
Rate this question:
Group policy
Baseline configuration
Patch management
A security template
Rate this question:
Most of the implementations use the x.500 directory model
Some of the implementations use default TCP ports 389 and 636
Some implementations use x.509 certificates for securing communications
All attributes will be encrypted
Rate this question:
Both logon successes and logon failures
Only logon failures for non-existent users
Only logon success
Only logon failures
Rate this question:
Detecting performance anomalies that may be due to security breaches
Assuring that systems are working to their optimal capacity
Knowing when security scans are going to finish
Predicting the end of useful life for the firewall
All of the Above
Rate this question:
The login should be the same as the domain account for authentication purposes
The application should not be deployed if it is not fully tested
It is not considered best practice to have a user remember multiple logins
It can be used as a backdoor into the company’s databases
Rate this question:
Have a protocol analyzer intercept traffic between two hosts
Know the IP addresses of both hosts and sequence numbers of the TCP/IP packets
Perform a man-in-the-middle attack and communicate directly with two hosts
Obtain the MAC address of the both hosts
Rate this question:
A circuit-level firewall
A honeypot
A IDS
A system integrity verifier
Rate this question:
Log file monitor (LFM)
System integrity verifier (SIV)
Host-based IDS
Network IDS
Rate this question:
RBAC (Role Based Access Control)
DAC (Discretionary Access Control)
MAC (Mandatory Access Control)
All of the Above
None of the above.
Rate this question:
DAC (Discretionary Access Control) relies only on the identity of the user or process, leaving room for a Trojan horse.
DAC (Discretionary Access Control) relies on certificates, allowing attackers to use those certificates.
DAC (Discretionary Access Control) does not rely on the identity of a user, allowing anyone to use an account.
DAC (Discretionary Access Control) has no known security flaws.
Rate this question:
Capabilities
Access control lists
Permission bits
Profiles
Rate this question:
User B has read, write and execute permissions on the file
User B has read and write permissions on the file.
User B has no permissions on the file.
User B has read permissions on the file.
None of the Above
Rate this question:
File, printer, and mailbox roles
Sales, marketing, management, and production roles
User and workstation roles
Allow access and deny access roles
Rate this question:
Files that don't have an owner CANNOT be modified.
The administrator of the system is an owner of each object.
The operating system is an owner of each object.
Each object has an owner, which has full control over the object.
None of the Above
Rate this question:
Sensitivity labels
Group membership
Ownership
Access control lists
Rate this question:
MACs (Mandatory Access Control)
RBACs (Role Based Access Control)
LBACs (List Based Access Control)
DACs (Discretionary Access Control)
Rate this question:
RBAC (Role Based Access Control).
NDAC (Non-Discretionary Access Control).
MAC (Mandatory Access Control).
DAC (Discretionary Access Control).
Rate this question:
Use levels of security to classify users and data
Allow owners of documents to determine who has access to specific documents
Use access control lists which specify a list of authorized users
Use access control lists which specify a list of unauthorized users
Rate this question:
Quiz Review Timeline (Updated): Dec 16, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.