Security+ (Syo-201) Domain #1: Systems Security

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Baldeagle79
B
Baldeagle79
Community Contributor
Quizzes Created: 2 | Total Attempts: 3,860
Questions: 9 | Attempts: 2,316

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Covers the Systems Security Domain of the SYO-201 Security+ exam by CompTIA.


Questions and Answers
  • 1. 

    Which software program runs in a sandbox?

    • A.

      JavaScript

    • B.

      Java

    • C.

      ActiveX

    • D.

      BASIC

    Correct Answer
    B. Java
    Explanation
    Java is the correct answer because it is a software program that runs in a sandbox. A sandbox is a secure environment that isolates the program from the rest of the system, preventing it from accessing sensitive resources or causing harm. Java's sandbox environment allows it to execute untrusted code safely by restricting its access to certain system resources and preventing malicious actions. This makes Java a popular choice for running applications in a secure and controlled manner.

    Rate this question:

  • 2. 

    Over which port does IMAP run over?

    • A.

      25

    • B.

      139

    • C.

      143

    • D.

      110

    Correct Answer
    C. 143
    Explanation
    25 is SMTP, 139 is NetBios Session Service, 110 is POP3 (email)

    Rate this question:

  • 3. 

    A retrovirus is best described as ...

    • A.

      A virus written in the 1980's and 1990's

    • B.

      A virus that attacks or bypasses anti-virus software

    • C.

      A virus that can encrypt portions of its own code

    • D.

      A virus that hides in the kernel of an operating system

    Correct Answer
    B. A virus that attacks or bypasses anti-virus software
    Explanation
    A retrovirus is best described as a virus that attacks or bypasses anti-virus software. Retroviruses are a type of RNA virus that replicate by converting their RNA into DNA and integrating it into the host cell's genome. This allows them to evade detection and removal by anti-virus software, making them particularly dangerous. They have the ability to modify their own code and adapt to the defenses put in place to combat them, making them highly effective at infecting and spreading within a system.

    Rate this question:

  • 4. 

    What type of virus relies on the weakness of the 8.3 file naming convention?

    • A.

      Retrovirus

    • B.

      Polymorhpic

    • C.

      Armored

    • D.

      Companion

    Correct Answer
    D. Companion
    Explanation
    The correct answer is "companion." A companion virus is a type of virus that relies on the weakness of the 8.3 file naming convention. The 8.3 file naming convention is a limitation in older operating systems that only allowed file names to be a maximum of 8 characters long, followed by a period and a 3-character file extension. Companion viruses take advantage of this limitation by creating a file with the same name as an existing file but with a different file extension. When the original file is executed, the companion virus is also executed, infecting the system.

    Rate this question:

  • 5. 

    What service runs over UDP port 53?

    • A.

      DNS name queries

    • B.

      SNMP

    • C.

      NetBIOS

    • D.

      TFTP

    Correct Answer
    A. DNS name queries
    Explanation
    DNS (Domain Name System) is a protocol used for translating domain names into IP addresses. DNS name queries are performed to retrieve information about domain names, such as the IP address associated with a specific domain. These queries are sent over UDP (User Datagram Protocol) port 53, making it the correct answer for the service that runs over this port. UDP is a connectionless protocol that provides a faster and more lightweight communication compared to TCP (Transmission Control Protocol), which is used for reliable and ordered data transmission.

    Rate this question:

  • 6. 

    What constitutes a single package containing multiple updates to a program?

    • A.

      Hotfix

    • B.

      Patch

    • C.

      Service pack

    • D.

      Update

    Correct Answer
    C. Service pack
    Explanation
    A service pack is a single package that contains multiple updates to a program. It is typically released by software vendors to provide bug fixes, security enhancements, and additional features. Service packs are designed to update and improve the overall functionality and stability of the program. Unlike hotfixes or patches, which address specific issues or vulnerabilities, a service pack includes a collection of updates that have been tested and bundled together for easier deployment and installation.

    Rate this question:

  • 7. 

    What describes a buffer overflow?

    • A.

      When too many cookies are installed on the host machine

    • B.

      When browsers are configured to handle an ActiveX component from a server

    • C.

      When a program or application is given more data than it is designed to handle

    • D.

      When IPSec is used on transport mode only

    Correct Answer
    C. When a program or application is given more data than it is designed to handle
    Explanation
    A buffer overflow occurs when a program or application is provided with more data than it can handle. This can lead to the excess data overwriting adjacent memory locations, causing the program to behave unexpectedly or crash. It is a common vulnerability that can be exploited by attackers to execute arbitrary code or gain unauthorized access to a system.

    Rate this question:

  • 8. 

    Which of the following is NOT part of hardening the operating system?

    • A.

      Apply the latest service packs and updates (once tested)

    • B.

      Disable unnecessary applications and service

    • C.

      Rename the default accounts

    • D.

      Turn off auditing

    Correct Answer
    D. Turn off auditing
    Explanation
    Turning off auditing is not part of hardening the operating system because auditing is an important security feature that helps track and monitor system activities. It allows administrators to identify and investigate any suspicious or unauthorized activities on the system. Disabling auditing would hinder the ability to detect and respond to potential security breaches or incidents. Therefore, it is not recommended as part of the hardening process.

    Rate this question:

  • 9. 

    This displays advertisements, generally as pop-ups, as it runs on your computer.

    • A.

      Adware

    • B.

      Spyware

    • C.

      Malware

    • D.

      Tupperware

    Correct Answer
    A. Adware
    Explanation
    Adware is a type of software that displays advertisements, often in the form of pop-ups, while running on a computer. It is designed to generate revenue for the software developer by promoting products or services. Unlike spyware or malware, adware does not typically harm the computer or steal personal information. Tupperware, on the other hand, is a brand of food storage containers and is unrelated to the question.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 15, 2009
    Quiz Created by
    Baldeagle79
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.