Security +

8 Questions | Total Attempts: 3369

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Exam questions for security +


Questions and Answers
  • 1. 
    A biometric fingerprint scanner is an example of which of the following?
    • A. 

      Two-factor authentication

    • B. 

      SSO

    • C. 

      Three-factor authentication

    • D. 

      Single-factor authentication

  • 2. 
    A user ID, PIN, and a palm scan are all required to authenticate a system. Which of the following is this an example of?
    • A. 

      SSO

    • B. 

      B. Two-factor authentication

    • C. 

      C. Single-factor authentication

    • D. 

      D. Three-factor authentication

  • 3. 
    Which of the following would be disabled to prevent SPIM?
    • A. 

      A. P2P

    • B. 

      B. ActiveX controls

    • C. 

      C. Instant messaging

    • D. 

      D. Internet mail

  • 4. 
    A user sees an MD5 hash number beside a file that they wish to downloaD. Which of the following BEST describes a hash?
    • A. 

      A. A hash is a unique number that is generated based upon the TCP/IP transmission header and should be verified before downloaD.

    • B. 

      B. A hash is a unique number that is generated based upon the files contents and used as the SSL key during downloaD.

    • C. 

      C. A hash is a unique number that is generated after the file has been encrypted and used as the SSL key during downloaD.

    • D. 

      D. A hash is a unique number that is generated based upon the files contents and should be verified after downloaD.

  • 5. 
    According to a good disaster recovery plan, which of the following must happen during a power outage before an uninterruptible power supply (UPS) drains its battery?
    • A. 

      A. The PKI CA is relocateD

    • B. 

      B. The backup generator activates.

    • C. 

      C. The single point of failure is remedieD.

    • D. 

      D. Full electrical service is restoreD.

  • 6. 
    Which of the following would give a technician the MOST information regarding an external attack on the network?
    • A. 

      A. Internet content filter

    • B. 

      B. Proxy server

    • C. 

      C. NIDS

    • D. 

      D. Firewall

  • 7. 
    Which of the following would BEST prevent night shift workers from logging in with IDs and passwords stolen from the day shift workers?
    • A. 

      A. Account expiration

    • B. 

      B. Time of day restriction

    • C. 

      C. Account lockout

    • D. 

      D. Domain password policy

  • 8. 
    Which of the following would BEST ensure that users have complex passwords?
    • A. 

      A. ACL

    • B. 

      B. Domain password policy

    • C. 

      C. Logical tokens

    • D. 

      D. Time of day restrictions

Back to Top Back to top