Security +

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tkelley213
T
Tkelley213
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,758
Questions: 8 | Attempts: 3,759

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Exam questions for security +


Questions and Answers
  • 1. 

    A biometric fingerprint scanner is an example of which of the following?

    • A.

      Two-factor authentication

    • B.

      SSO

    • C.

      Three-factor authentication

    • D.

      Single-factor authentication

    Correct Answer
    D. Single-factor authentication
    Explanation
    A biometric fingerprint scanner is an example of single-factor authentication because it relies solely on the unique physical characteristic of a person's fingerprint to verify their identity. It does not require any additional factors such as a password or security token.

    Rate this question:

  • 2. 

    A user ID, PIN, and a palm scan are all required to authenticate a system. Which of the following is this an example of?

    • A.

      SSO

    • B.

      B. Two-factor authentication

    • C.

      C. Single-factor authentication

    • D.

      D. Three-factor authentication

    Correct Answer
    B. B. Two-factor authentication
    Explanation
    This scenario is an example of two-factor authentication because it requires the user to provide two different types of credentials to authenticate the system. The user ID and PIN serve as the first factor, while the palm scan serves as the second factor. This adds an extra layer of security as it combines something the user knows (PIN) with something the user has (palm scan) to verify their identity.

    Rate this question:

  • 3. 

    Which of the following would be disabled to prevent SPIM?

    • A.

      A. P2P

    • B.

      B. ActiveX controls

    • C.

      C. Instant messaging

    • D.

      D. Internet mail

    Correct Answer
    C. C. Instant messaging
    Explanation
    To prevent SPIM (Spam over Instant Messaging), disabling instant messaging would be an effective measure. SPIM refers to unsolicited and unwanted messages sent through instant messaging platforms. By disabling instant messaging, organizations can reduce the risk of receiving spam messages and protect their network from potential security threats. Disabling P2P, ActiveX controls, or internet mail may have other security benefits but would not specifically address the issue of SPIM.

    Rate this question:

  • 4. 

    A user sees an MD5 hash number beside a file that they wish to downloaD. Which of the following BEST describes a hash?

    • A.

      A. A hash is a unique number that is generated based upon the TCP/IP transmission header and should be verified before downloaD.

    • B.

      B. A hash is a unique number that is generated based upon the files contents and used as the SSL key during downloaD.

    • C.

      C. A hash is a unique number that is generated after the file has been encrypted and used as the SSL key during downloaD.

    • D.

      D. A hash is a unique number that is generated based upon the files contents and should be verified after downloaD.

    Correct Answer
    D. D. A hash is a unique number that is generated based upon the files contents and should be verified after downloaD.
    Explanation
    A hash is a unique number that is generated based upon the files contents and should be verified after downloading. This means that the hash is calculated using an algorithm that takes into account the entire file, creating a unique value that can be used to verify the integrity of the file. By comparing the hash of the downloaded file with the original hash, the user can ensure that the file has not been tampered with or corrupted during the download process.

    Rate this question:

  • 5. 

    According to a good disaster recovery plan, which of the following must happen during a power outage before an uninterruptible power supply (UPS) drains its battery?

    • A.

      A. The PKI CA is relocateD

    • B.

      B. The backup generator activates.

    • C.

      C. The single point of failure is remedieD.

    • D.

      D. Full electrical service is restoreD.

    Correct Answer
    B. B. The backup generator activates.
    Explanation
    During a power outage, an uninterruptible power supply (UPS) is designed to provide temporary power until a backup generator activates. This ensures that there is continuous power supply to critical systems and prevents any disruption or loss of data. Therefore, the correct answer is B. The backup generator activates.

    Rate this question:

  • 6. 

    Which of the following would give a technician the MOST information regarding an external attack on the network?

    • A.

      A. Internet content filter

    • B.

      B. Proxy server

    • C.

      C. NIDS

    • D.

      D. Firewall

    Correct Answer
    C. C. NIDS
    Explanation
    A Network Intrusion Detection System (NIDS) would provide the technician with the most information regarding an external attack on the network. NIDS is designed to monitor network traffic and detect any suspicious or malicious activity. It can analyze packets of data, identify patterns or signatures of known attacks, and generate alerts or reports. This allows the technician to have a comprehensive view of the network and gain insights into potential threats or breaches. The other options, such as an internet content filter, proxy server, or firewall, may provide some level of protection or filtering, but they do not offer the same level of detailed information about external attacks.

    Rate this question:

  • 7. 

    Which of the following would BEST prevent night shift workers from logging in with IDs and passwords stolen from the day shift workers?

    • A.

      A. Account expiration

    • B.

      B. Time of day restriction

    • C.

      C. Account lockout

    • D.

      D. Domain password policy

    Correct Answer
    B. B. Time of day restriction
    Explanation
    Time of day restriction would be the best solution to prevent night shift workers from logging in with IDs and passwords stolen from the day shift workers. By restricting access to certain hours of the day, it ensures that only authorized individuals are able to log in during the night shift. This prevents anyone with stolen credentials from using them during unauthorized times. Other options such as account expiration, account lockout, and domain password policy may provide some level of security, but they do not specifically address the issue of stolen credentials being used during the night shift.

    Rate this question:

  • 8. 

    Which of the following would BEST ensure that users have complex passwords?

    • A.

      A. ACL

    • B.

      B. Domain password policy

    • C.

      C. Logical tokens

    • D.

      D. Time of day restrictions

    Correct Answer
    B. B. Domain password policy
    Explanation
    A domain password policy is the best way to ensure that users have complex passwords. This policy can enforce requirements such as minimum length, use of special characters, and regular password changes. By implementing a domain password policy, organizations can ensure that users are using strong passwords that are difficult to guess or crack, thereby enhancing the security of their systems and data.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.