Security+ Sy0-201

9 Questions | Total Attempts: 995

SettingsSettingsSettings
Security Plus Quizzes & Trivia

CompTIA Security+ practice questions


Questions and Answers
  • 1. 
    Who is responsible for establishing access permissions to network resources in the DAC access control model?
    • A. 

      The system administrator

    • B. 

      The owner of the resource

    • C. 

      The system administrator and the owner of the resource

    • D. 

      The user requiring access to the resource

  • 2. 
    Why will a Faraday cage be used?
    • A. 

      To find rogue access points

    • B. 

      To allow wireless usage

    • C. 

      To mitigate data emanation

    • D. 

      To minimize weak encryption

  • 3. 
    Which definition best defines what a challenge-response session is?
    • A. 

      A challenge-response session is a workstation or system that produces a random challenge string that the user provides, when prompted, in conjunction with the proper PIN (Personal Identification Number).

    • B. 

      A challenge-response session is a workstation or system that produces a random login ID that the user provides, when prompted, in conjunction with the proper PIN (Personal Identification Number).

    • C. 

      A challenge-response session is a special hardware device used to produce random text in a cryptography system.

    • D. 

      A challenge-response session is the authentication mechanism in the workstation or system that does not determine whether the owner should be authenticated

  • 4. 
    The hashing algorithm is created from a hash value, making it nearly impossible to derive the original input number. Which item can implement the strongest hashing algorithm?
    • A. 

      NTLMv2

    • B. 

      LANMAN

    • C. 

      NTLM

    • D. 

      VLAN

  • 5. 
    For which reason are clocks used in Kerberos authentication?
    • A. 

      Clocks are used to ensure proper connections.

    • B. 

      Clocks are used to ensure that tickets expire correctly.

    • C. 

      Clocks are used to generate the seed value for the encryptions keys

    • D. 

      Clocks are used to both benchmark and specify the optimal encryption algorithm

  • 6. 
    Network utilization is the ratio of current network traffic to the maximum traffic that the port can handle. Which of the following can most effectively determine whether network utilization is abnormal?
    • A. 

      Application log

    • B. 

      Performance baseline

    • C. 

      Systems monitor

    • D. 

      Security log

  • 7. 
    To reduce vulnerabilities on a web server, an administrator should adopt which of the following preventative measures?
    • A. 

      Use packet sniffing software on all inbound communications

    • B. 

      Apply the most recent manufacturer updates and patches to the server.

    • C. 

      Enable auditing on the web server and periodically review the audit logs

    • D. 

      Block all Domain Name Service (DNS) requests coming into the server

  • 8. 
    Which of the following is a common type of attack on web servers?
    • A. 

      Birthday

    • B. 

      Buffer overflow

    • C. 

      Spam

    • D. 

      Brute Force

  • 9. 
    The employees at a company are using instant messaging on company networked computers. The MOST important security issue to address when using instant messaging is that instant messaging:
    • A. 

      Communications are a drain on bandwidth

    • B. 

      Communications are open and unprotected

    • C. 

      Has no common protocol

    • D. 

      Uses weak encryption