Set 1 CompTIA Security+ Practice Questions

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 624,400
| Attempts: 11,279 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. Which of the following does relates to Biometricsy?

Explanation

The Biometrics uses finger prints, retinal scan and some times the DNA structure too to establish user Id.

Submit
Please wait...
About This Quiz
Set 1 CompTIA Security+ Practice Questions - Quiz

Comptia Security+ Practice Questions covering the exam objective: Concepts of Security. You can take these for practice or take it as a topic wise practice exam. Feedback and... see morecomments are welcome! see less

2. Which of the following services when placed on the edge of the network, will provide security to the entire network?

Explanation

Router is a gateway and antivirus resides on all systems. Firewall is meant to safe guard the network from external attacks.

Submit
3. Access Control list contains information relating to user to resource access mapping. T/F?

Explanation

The information of mapping users to their permissions for resource access would be available in the ACL.

Submit
4. Which of the following is the best way to ascertain unique identification of an employee?

Explanation

Biometric will authenticate or establish User ID depending on the physical attribute of the user. For ex: Finger print, hand scan or retina scan.

Submit
5. Which of the following would provide security for Web site access?

Explanation

Certificates are best used during WAN access. For ex: when using web sites that require you to provide confidential information about yourself, or when you are logging in to the Intranet, from an unknown location.

Submit
6. Which of the following is an example of the DoS?

Explanation

DoS is a way of engaging a Web Server continuously in one specific task by outing it on a loop and ensuring it is unable to respond to any further requests.

Submit
7. MAC allows dynamic sharing of resources. T/F?

Explanation

MAC uses a static or predefined set of access privileges and hence cannot allow dynamic sharing of resources.

Submit
8. To allow access to a campus you would use smart card. T/F?

Explanation

To allow access to a campus you would use smart cards.

Submit
9. Who is responsible for access control in the MAC model?

Explanation

System administrator is responsible for access control in the MAC model. The owner will be responsible for DAC. The RBAC is dependent on the role played by the user in the organization.

Submit
10. When debugging an Operating system, a programmer would make use of a back door door. T/F?

Explanation

A programmer makes use of back doors in the program for the purpose of debugging or observing the performance of the program.

Submit
11. To transfer mails between email servers and respective clients you would require POP3 service. T/F?

Explanation

To transfer mails between email servers and their respective clients POP3 (Post Office Protocol Version 3) is used.

Submit
12. Which of the following is a key component in the Kerberos system?

Explanation

The Kerberos system requires a Key Distribution Center (KDC) which is responsible for authenticating any network user, Computer or Service. Depending on whether the authentication fails or succeeds the ticket will be granted to the end user, Computer or Service.

Submit
13. Which of the following is a disadvantage when using a Wireless LAN?

Explanation

Wireless LANs is dependent on frequency for transmission and reception. This makes the media very susceptible to overhearing or eavesdropping.

Submit
14. Which of the following is an advantage with clear text authentication?

Explanation

Clear text authentication is very simple and easy to implement and verify. But a network that has implemented clear text security is not very secure as it is very easy to decipher clear text passwords.

Submit
15. Which of the following use clear text password for authentication?

Explanation

PAP uses clear text and is a two-way handshake protocol.

Submit
16. Which of the following is used to establish an error free IP-based network?

Explanation

It is imperative that users be assigned IP addresses for the purpose of connecting to the company resources. This dynamic allocation will be possible only with the help of DHCP service.

Submit
17. A token is authentication protocol. T/F?

Explanation

A token is generated when a user has been successfully authenticated. This token is attached to the users session and will be destroyed once the session is terminated or after the user has logged out. This token will contain user access permission assigned on the network resources for that user. Token is a system and not a protocol.

Submit
18. RADIUS is a dial-up protocol. T/F?

Explanation

RADIUS is a RAS authentication Service.

Submit
19. DDoS is a best way for testing Web server vulnerabilities. T/F?

Explanation

DDoS (Distributed DoS) would test for more vulnerabilities on the server than the DoS would.

Submit
20. Which of the following services relates to acknowledgment-less data transfer?

Explanation

TFTP (trivial File Transfer Protocol) uses UDP for data transfer and hence does not facilitate acknowledgements.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 18, 2006
    Quiz Created by
    Vaibhav Agarwal
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following does relates to Biometricsy?
Which of the following services when placed on the edge of the...
Access Control list contains information relating to user to resource...
Which of the following is the best way to ascertain unique...
Which of the following would provide security for Web site access?
Which of the following is an example of the DoS?
MAC allows dynamic sharing of resources. T/F?
To allow access to a campus you would use smart card. T/F?
Who is responsible for access control in the MAC model?
When debugging an Operating system, a programmer would make use of a...
To transfer mails between email servers and respective clients you...
Which of the following is a key component in the Kerberos system?
Which of the following is a disadvantage when using a Wireless LAN?
Which of the following is an advantage with clear text authentication?
Which of the following use clear text password for authentication?
Which of the following is used to establish an error free IP-based...
A token is authentication protocol. T/F?
RADIUS is a dial-up protocol. T/F?
DDoS is a best way for testing Web server vulnerabilities. T/F?
Which of the following services relates to acknowledgment-less data...
Alert!

Advertisement