Comptia Security+ Practice Exam- 1
Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.
A circuit-level firewall
A honeypot
A IDS
A system integrity verifier
Rate this question:
Something you are
Something you know
Something you have
All of the Above
None of the Above
Rate this question:
The authentication process is known as need to know.
The authentication process is known as decentralized management.
The authentication process is known as Discretionary Access Control (DAC).
The authentication process is known as single sign-on.
Rate this question:
Passwords
Tokens
Biometrics
Shared secrets
Rate this question:
Something you have
Something you know
Something you are
All of the Above
None of the Above
Rate this question:
You should identify the Biometric authentication model.
You should identify the Multifactor authentication model.
You should identify the Mutual authentication model.
You should identify the Tokens authentication model.
Rate this question:
This is a feature of Discretionary Access Control (DAC).
This is a feature of Rule Based Access Control (RBAC).
This is a feature of Role Based Access Control (RBAC).
This is a feature of Mandatory Access Control (MAC).
Rate this question:
Authentication
Authorization
Certification
Accountability
Rate this question:
Challenge Handshake Authentication Protocol (CHAP) is used to access multiple systems within a company.
Single Sign-on is used to access multiple systems within a company.
Kerberos is used to access multiple systems within a company.
Mandatory Access Control (MAC) is used to access multiple systems within a company.
Rate this question:
RADIUS
PAP
MS-CHAP
CHAP
Rate this question:
Both logon successes and logon failures
Only logon failures for non-existent users
Only logon success
Only logon failures
Rate this question:
The login should be the same as the domain account for authentication purposes
The application should not be deployed if it is not fully tested
It is not considered best practice to have a user remember multiple logins
It can be used as a backdoor into the company’s databases
Rate this question:
RBAC (Role Based Access Control)
DAC (Discretionary Access Control)
MAC (Mandatory Access Control)
All of the Above
None of the above.
Rate this question:
To ensure proper connections.
To ensure tickets expire correctly.
To generate the seed value for the encryptions keys.
To benchmark and set the optimal encryption algorithm.
Rate this question:
You should make use of the Kerberos authentication method.
You should make use of the Challenge Handshake Authentication Protocol (CHAP) authentication method.
You should make use of the Username/password authentication method
You should make use of the Multifactor authentication method.
Rate this question:
Retention policies
Administrator preferences
MTTF
MTTR
All of the Above
Rate this question:
Passwords must be changed at least once every 60 days, depending on your environment.
Passwords must not be the same as user id or login id.
Password aging must be enforced on all systems.
Password must be easy to memorize.
All of the Above
Rate this question:
. You should make use of the Role Based Access Control (RBAC) model.
You should make use of the Mandatory Access Control (MAC) model.
You should make use of the Rule Based Access Control (RBAC) model.
You should make use of the Discretionary Access Control (DAC) model.
Rate this question:
You should identify Mandatory Access Control (MAC).
You should identify Role Based Access Control (RBAC).
You should identify Discretionary Access Control (DAC).
You should identify List Based Access Control (LBAC).
Rate this question:
MACs (Mandatory Access Control)
RBACs (Role Based Access Control)
LBACs (List Based Access Control)
DACs (Discretionary Access Control)
Rate this question:
You should identify the Discretionary Access Control (DAC) access control model.
You should identify the Role Based Access Control (RBAC) access control model.
You should identify the Mandatory Access Control (MAC) access control model.
You should identify the Rule Based Access Control (RBAC) access control model.
None of the Above
Rate this question:
The Discretionary Access Control (DAC) access control model would be most suitable.
The Rule Based Access Control (RBAC) access control model would be most suitable.
The Role Based Access Control (RBAC) access control model would be most suitable.
The Mandatory Access Control (MAC) access control model would be most suitable.
Rate this question:
Logical attacks
Physical attacks
Trojan Horse attacks
Social Engineering attacks
None of the Above
Rate this question:
File, printer, and mailbox roles
Sales, marketing, management, and production roles
User and workstation roles
Allow access and deny access roles
Rate this question:
The Biometric authentication best illustrates this scenario.
The Kerberos authentication best illustrates this scenario.
The Mutual authentication best illustrates this scenario.
The Multifactor authentication best illustrates this scenario.
Rate this question:
Detecting performance anomalies that may be due to security breaches
Assuring that systems are working to their optimal capacity
Knowing when security scans are going to finish
Predicting the end of useful life for the firewall
All of the Above
Rate this question:
Files that don't have an owner CANNOT be modified.
The administrator of the system is an owner of each object.
The operating system is an owner of each object.
Each object has an owner, which has full control over the object.
None of the Above
Rate this question:
Sensitivity labels are based on a Mandatory Access Control (MAC) environment.
Access control lists are based on a Mandatory Access Control (MAC) environment.
Group membership is based on a Mandatory Access Control (MAC) environment.
Ownership is based on a Mandatory Access Control (MAC) environment.
Rate this question:
IPSEC
TSTEC
PRVMIN
RBAC
Rate this question:
21
23
53
55
Rate this question:
1,024
32
16,777,216
65,535
Rate this question:
All that is expressly permitted is forbidden
All that is not expressly permitted is not forbidden
All that is not expressly permitted is forbidden
Both A and B
No Answer is Correct
Rate this question:
Capabilities
Access control lists
Permission bits
Profiles
Rate this question:
Sensitivity labels
Group membership
Ownership
Access control lists
Rate this question:
Social Engineering attacks
Logical attacks
Physical attacks
Trojan Horse attacks
None of the Above
Rate this question:
CORBA
IPSec
PPTP
DCOM
Both A & D
Rate this question:
You should make use of the Mutual authentication method.
You should make use of the Biometric authentication method.
You should make use of the Username/password authentication method.
You should make use of the Multifactor authentication method.
Rate this question:
Use levels of security to classify users and data
Allow owners of documents to determine who has access to specific documents
Use access control lists which specify a list of authorized users
Use access control lists which specify a list of unauthorized users
Rate this question:
Dynamic IP (Internet Protocol) routing protocols for routers and servers.
Separate network segments for the realms
Token authentication devices.
Time synchronization services for clients and servers.
Rate this question:
It is an example of Rule Based Access Control (RBAC).
It is an example of Mandatory Access Control (MAC).
It is an example of Role Based Access Control (RBAC).
It is an example of Discretionary Access Control (DAC).
RBAC (Role Based Access Control).
NDAC (Non-Discretionary Access Control).
MAC (Mandatory Access Control).
DAC (Discretionary Access Control).
Rate this question:
You should place a File and print server on the private network.
You should place a Remote Access Server (RAS) on the private network.
You should place an E-mail server on the private network.
You should place a Web server on the private network.
Rate this question:
Mandatory controls
Discretionary controls
Secret controls
Corrective controls
Non of the Above
Rate this question:
Which of the following factors must be considered when implementing Kerberos authentication?
Kerberos tickets can be spoofed using replay attacks to network resources.
Kerberos requires a centrally managed database of all user and resource passwords.
Kerberos uses clear text passwords.
Rate this question:
Rule based access control
Lattice based access control
Directory based access control
ID based access control
All of the Above
Rate this question:
You make use of message authentication codes to provide the Key recovery service.
You make use of message authentication codes to provide the Fault recovery service.
You make use of message authentication codes to provide the Acknowledgement service.
You make use of message authentication codes to provide the Integrity service.
Rate this question:
VPN (Virtual Private Network).
PPTP (Point-to-Point Tunneling Protocol).
One time password.
Complex password requirement.
Rate this question:
DAC (Discretionary Access Control) relies only on the identity of the user or process, leaving room for a Trojan horse.
DAC (Discretionary Access Control) relies on certificates, allowing attackers to use those certificates.
DAC (Discretionary Access Control) does not rely on the identity of a user, allowing anyone to use an account.
DAC (Discretionary Access Control) has no known security flaws.
Rate this question:
Quiz Review Timeline (Updated): Dec 16, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Security Plus Questions: Comptia Quiz!
CompTIA Security+ is an entry-level certification that develops network security knowledge. CompTIA certification covers IT concepts, basic IT literacy, and terminology....
Questions:
47 |
Attempts:
252 |
Last updated:
Oct 24, 2024
|
CompTIA Security+ SY0-501 Practice Test 02
CompTIA Security+ SY0-501 Practice Test 02 assesses knowledge on securing network devices, supporting data integrity, non-repudiation, confidentiality, and theft prevention. Ideal...
Questions:
201 |
Attempts:
168 |
Last updated:
May 14, 2024
|
CompTIA Security+ SY0-501 Practice Test 01
This CompTIA Security+ SY0-501 Practice Test assesses key cybersecurity skills, focusing on the confidentiality, integrity, and availability of information systems. It evaluates...
Questions:
75 |
Attempts:
335 |
Last updated:
Aug 19, 2023
|
Quiz On CompTIA Security+ Certification! Trivia Questions
Are you looking for a quiz to help you in preparation for the CompTIA Security+ Certification? If so, the questionnaire below is precisely what you may need to refresh your...
Questions:
20 |
Attempts:
326 |
Last updated:
Mar 20, 2023
|
Comptia Security+ Practice Exam
Comptia Security+ Practice Exam- 1
Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time...
Questions:
100 |
Attempts:
234 |
Last updated:
May 28, 2024
|
Comptia Security PLUS Practice Exam
Comptia Security+ Practice Exam- 1Full length Comptia Security+ Practice Exam. Take this exam like the
real exam to see if you are completely prepared for the real...
Questions:
100 |
Attempts:
345 |
Last updated:
Dec 05, 2023
|