Comptia Security+ Practice Exam- 1 Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.
Violating the security
Strengthening the security policy
Hardening the system
Protecting the DMZ
IPSEC
TSTEC
PRVMIN
RBAC
Bootp
Tftp
Sunrpc
All of the Above
No Answer is Correct
Retention policies
Administrator preferences
MTTF
MTTR
All of the Above
Server based access control
Rule based access control
Token based access control
Role based access control
All of the Above
The use of tokens
The use of profiles
The use of information flow labels
The use of data flow diagrams
Rule based access control
Lattice based access control
Directory based access control
ID based access control
All of the Above
Objects
Scripts
Factors
Models
Both A and B
All that is expressly permitted is forbidden
All that is not expressly permitted is not forbidden
All that is not expressly permitted is forbidden
Both A and B
No Answer is Correct
Privilege
Subject
Sensitivity
Object
Mandatory controls
Discretionary controls
Secret controls
Corrective controls
Non of the Above
Preventive controls
Need-to-know controls
Mandatory adjustable controls
All of the Above
None of the Above
Something you have
Something you know
Something you are
All of the Above
None of the Above
Something you are
Something you know
Something you have
All of the Above
None of the Above
Passwords must be changed at least once every 60 days, depending on your environment.
Passwords must not be the same as user id or login id.
Password aging must be enforced on all systems.
Password must be easy to memorize.
All of the Above
Password history is used.
Password reuse is not allowed.
Any password used must not be word found in a dictionary.
All of the Above
None of the Above
Social Engineering attacks
Logical attacks
Physical attacks
Trojan Horse attacks
None of the Above
Logical attacks
Physical attacks
Trojan Horse attacks
Social Engineering attacks
None of the Above
RADIUS
PPTP
L2TP
IPSec
None of the Above
A Network Access Server
The end user
The authentication server
All of the Above
None of the Above
Host-based
Identity-based
Signature-based
Network-based
It is very costly to set up.
It is not effective.
It cannot analyze encrypted information.
It is very costly to manage.
All of the Above
Telnet
POP
FTP
SSH
All of the Above
CORBA
IPSec
PPTP
DCOM
Both A & D
PPTP
IPSEC
OSPF
L2TP
None of the Above
Wait!
Here's an interesting quiz for you.