Security+ Mock Exam Questions Set 2

29 Questions | Total Attempts: 333

SettingsSettingsSettings
Please wait...
Internet Security Quizzes & Trivia

Securing Communication & other Infrastructure


Questions and Answers
  • 1. 
    Which of the following is the most popular protocol that is used in dial-up connections?
    • A. 

      SLIP

    • B. 

      PPTP

    • C. 

      POP3

    • D. 

      PPP

  • 2. 
    Which of the following protocols could a VPN make use of? Choose two.
    • A. 

      PPTP

    • B. 

      L2TP

    • C. 

      HTTP

    • D. 

      NNTP

  • 3. 
    When a remote user is dialing-in to the network, which of the following servers would be challenging his request for authentication first?
    • A. 

      Authenticating server

    • B. 

      RADIUS Server

    • C. 

      HTTP Server

    • D. 

      File Server

  • 4. 
    You are configuring a VPN whose tunnel passes through the public network. You are concerned for the security as your VPN may be connecting across the globe to several networks operating on different platforms. Which of the following would be ideal to secure your VPN? Choose the best answer.
    • A. 

      PPTP

    • B. 

      IPSec

    • C. 

      Kerberos

    • D. 

      Certificate

  • 5. 
    Which of the following would help with dedicated authentication to dial-in clients?
    • A. 

      TACACS

    • B. 

      RADIUS

    • C. 

      IAS

    • D. 

      None of the above

  • 6. 
    Which of the following will be compulsory tasks to run on Web servers of your network? Choose two.
    • A. 

      Run regular vulnerability checks

    • B. 

      Update Virus definitions

    • C. 

      Re-install OS at regular frequency

    • D. 

      Disk management should be regular

  • 7. 
    Which of the following virus types can be transmitted via email? Choose all that apply.
    • A. 

      Worms

    • B. 

      Trojan horse

    • C. 

      Boot Record virus

    • D. 

      EXE file virus

  • 8. 
    When configuring antivirus for email, which of the following configurations must be applied? Choose two.
    • A. 

      Scan before downloading

    • B. 

      Scan before sending

    • C. 

      Scan before opening

    • D. 

      Scan after receiving

  • 9. 
    Which of the following port numbers is used by SMTP?
    • A. 

      21

    • B. 

      20

    • C. 

      25

    • D. 

      119

  • 10. 
    Which of the following statements about an email server is/are true? Choose only answer(s) that apply
    • A. 

      Verifies if destination domain is self or not before transmitting a mail

    • B. 

      Verifies if recipient is from local domain or not before receiving an email

    • C. 

      Verifies if email is infected or not

    • D. 

      None of the above

  • 11. 
    Which of the following statements regarding Infrared communication is true? Choose three.
    • A. 

      It requires line of sight

    • B. 

      It requires the same radio frequency at the transmitting and receiving end.

    • C. 

      It is least secure.

    • D. 

      Interception is possible if the tapping devices is also in the line of sight

    • E. 

      Interception is possible if the tapping device is also tuned to the same radio frequency as the main communicating devices.

  • 12. 
    Which of the following statements about a Modem are true? Choose two.
    • A. 

      It steps us AC voltage

    • B. 

      It steps down DC voltage

    • C. 

      It modulates and demodulates signals for the Computer and the telephone line.

    • D. 

      It converts Analog signals to digital and vice versa.

  • 13. 
    To which layer do the following communicating devices belong? Switch, Ethernet Card.
    • A. 

      Physical layer

    • B. 

      Datalink layer

    • C. 

      Network Layer

    • D. 

      None of the above

  • 14. 
    Which of the following communications use the 2.4 GHz frequency? Choose three.
    • A. 

      Wireless 802.11b and g

    • B. 

      Microwave

    • C. 

      Blue tooth

    • D. 

      Radio frequency

  • 15. 
    If you wish to block FTP access to your Web server, which of the following Firewall types should you consider?
    • A. 

      Stateful Inspection

    • B. 

      Port filtering

    • C. 

      Packet filtering

    • D. 

      Application filtering

  • 16. 
    Which of the following are capable of functioning as a Firewall? Choose two
    • A. 

      Proxy

    • B. 

      Router

    • C. 

      PC

    • D. 

      Switch

  • 17. 
    Which of the following about the Stateful inspection firewall is true? Choose two.
    • A. 

      It maintains a state table

    • B. 

      It maintains a routing table

    • C. 

      It functions on the network layer

    • D. 

      It functions on the application layer.

  • 18. 
    Stateful inspection firewall will operate on all the 7 layers of the OSI reference model. T/F?
    • A. 

      True

    • B. 

      False

  • 19. 
    Which of the following will relates to how the external world can access the internal network resources?
    • A. 

      Network policy

    • B. 

      Firewall policy

    • C. 

      Access policy

    • D. 

      None of the above

  • 20. 
    Which of the following firewall policies is most restrictive?
    • A. 

      Any any

    • B. 

      Deny all

    • C. 

      Permit all

    • D. 

      None of the above

  • 21. 
    When faced with an outgoing packet, which of the following header components would a firewall look at first?
    • A. 

      Protocol information

    • B. 

      Source address

    • C. 

      Destination address

    • D. 

      No of bytes in the header

  • 22. 
    If you have implemented a DHCP in your network and you would wish to secure this service so that no external user will be able to become a DHCP client, which of the following would you ensure?
    • A. 

      Block port numbers 20 and 21 on the external interface for incoming connections

    • B. 

      Block port numbers 20 and 21 on the internal interface.

    • C. 

      Block port numbers 67 and 68 on the external interface for incoming connections

    • D. 

      Block port numbers 67 and 68 on the internal interface

  • 23. 
    If you wish to allow the external users access your Web server you must block port number 110. T/F?
    • A. 

      True

    • B. 

      False

  • 24. 
    Which of the following can secure your internal server best, against external attacks? Choose all that apply.
    • A. 

      Perform OS hardening by blocking all access to this server

    • B. 

      Perform OS hardening by verify and terminating all un used service

    • C. 

      Regularly check for unused usernames and disable or delete them.

    • D. 

      Ensure you are running a vulnerability check on this server at regular intervals.

  • 25. 
    Which of the following is true about providing security to database servers? Choose two.
    • A. 

      Do not host a database server on the same server as your web server.

    • B. 

      Do not host a database server on a server based system

    • C. 

      Employ a three-tier model

    • D. 

      Employ a centralized administration model.

  • 26. 
    Which of the following is an ideal practice to ensure network resourcesí safety? Choose three.
    • A. 

      Rename guest accounts

    • B. 

      Rename administrator accounts.

    • C. 

      Ensure there is just one administrator account present.

    • D. 

      Ensure the administrator account does not have a blank password

    • E. 

      None of the above

  • 27. 
    To prevent internal Web servers from being accessed you must block TCP port 20. T/F?
    • A. 

      True

    • B. 

      False

  • 28. 
    Authorized update is one way of securing DNS serer. T/F?
    • A. 

      True

    • B. 

      False

  • 29. 
    Does NTFS provide file system security?
    • A. 

      Yes

    • B. 

      No