Set 2 CompTIA Security+ Exam Practice: Securing Communication & Infrastructure

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 624,404
| Attempts: 2,771 | Questions: 22
Please wait...
Question 1 / 22
0 %
0/100
Score 0/100
1. A Modem modulates and demodulates data signals. T/F?

Explanation

As the name suggests the modem mainly modulates and demodulates signals, it is responsible for converting the analog signals of the telephone to the digital signals required by the PC and vice versa.

Submit
Please wait...
About This Quiz
Set 2 CompTIA Security+ Exam Practice: Securing Communication & Infrastructure - Quiz

This is Set 2 of 4 of practice questions for Comptia Security+ exam. This set covers the exam objective Securing Communication & other Infrastructure. You can take these... see morefor practice or take it as a topic wise practice exam. Read the questions carefully and answer. So, let's try out the quiz. All the best! Feedback and comments are welcome!
see less

2. Which of the following firewall policies is most restrictive?

Explanation

The �deny all� is the most restrictive statement that is implicitly defined in the fireall when no other statement is configured. This will get applied to all packets that do not match with the criteria mentioned in the list above the �deny all� statement.

Submit
3. OS hardening is not possible on web servers. T/F?

Explanation

OS hardening is very much possible and essential for Web server.

Submit
4. FAT is the most secure of all Microsoft based file system. Y/N?

Explanation

NTFS is the most secure of all Microsoft based file system.

Submit
5. Infrared rays have a wide and far reachability. T/F?

Explanation

The Infrared communication requires line of sight. The device that intends communication will have to be placed in the line of sight for communication to be possible.

Submit
6. Port number for internal web server is 80. T/F?

Explanation

The port number 80 is the default HTTP port to which clients connect. This is also used for internal webserver.

Submit
7. Which of the following can be used to provide security for a VPN?

Explanation

IPSec is a security protocol that can be implemented on any IP-based setup. It is ideal VPN security solution.

Submit
8. An RJ-11 connector would belong to which of the following layers?

Explanation

RJ-11 connector belongs to the physical layer. The physical layer sets rules for connectivity and signal strength.

Submit
9. Port number 110 relates to Web services. T/F?

Explanation

Port number 80 relates to Web services

Submit
10. Which of the following accepts authentication requests from remote clients?

Explanation

The RADIUS server would be challenging the users request first, the request may then be received by any of the internal servers later.

Submit
11. L2TP can work over IPX based networks. Y/N?

Explanation

L2TP (Layer 2 Tunneling Protocol) was created by Cisco as well as Microsoft. It is meant to function over IP, IPX and SNA networks.

Submit
12. Which of the following is capable of functioning as a Firewall?

Explanation

The Router is capable of acting as a firewall as it can do filtering using ACL.

Submit
13. An Access policy is nothing but the access control list. T/F?

Explanation

The access control list may be created based on what the access policy dictates.

Submit
14. Stateful inspection firewall will operate on all the 7 layers of the OSI reference model. T/F?

Explanation

Stateful Inspection firewall will not operate on all the & layers of OSI reference mode.

Submit
15. Which of the following models for hosting a Database server is most secure?

Explanation

A three-tier model ensures security to your database server as the database server cannot be directly accessed in this model.

Submit
16. Which of the following accounts should be renamed for network resources safety?

Explanation

A guest account has to be renamed so that an intruder cannot guess the user name for the guest account and try to use it to access the network. Renaming admin account is also recommended (but that is not an option stated in the question)

Submit
17. Which of the following communications does not use the 2.4 GHz frequency?

Explanation

The microwave and the Wireless 802.11g and b all operate on the 2.4 GHz range. Radio frequency does not use the 2.4 GHz range.

Submit
18. Which of the following firewall types will allow for port security?

Explanation

Port filtering is done in packet filtering firewall types. Application filtering is irrelevant.

Submit
19. Which of the following is the best way to obtain vulnerability related information for database servers?

Explanation

There are web sites that keep updating vulnerability information for different platforms. It is ideal to constantly browse these sites to obtain required information.

Submit
20. The Stateful inspection firewall, monitors connection status based on the routing table. T/F?

Explanation

The Stateful inspection firewall, monitors connection status based on the state table.

Submit
21. Which of the following will be verified first for an incoming packet?

Explanation

The firewall will first look at the destination address.

Submit
22. Which of the following would not help with dedicated authentication to dial-in clients?

Explanation

RRAS is a Microsoft based Router-cum-RAS service.

Submit
View My Results

Quiz Review Timeline (Updated): Apr 18, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 18, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 18, 2006
    Quiz Created by
    Vaibhav Agarwal
Cancel
  • All
    All (22)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A Modem modulates and demodulates data signals. T/F?
Which of the following firewall policies is most restrictive?
OS hardening is not possible on web servers. T/F?
FAT is the most secure of all Microsoft based file system. Y/N?
Infrared rays have a wide and far reachability. T/F?
Port number for internal web server is 80. T/F?
Which of the following can be used to provide security for a VPN?
An RJ-11 connector would belong to which of the following layers?
Port number 110 relates to Web services. T/F?
Which of the following accepts authentication requests from remote...
L2TP can work over IPX based networks. Y/N?
Which of the following is capable of functioning as a Firewall?
An Access policy is nothing but the access control list. T/F?
Stateful inspection firewall will operate on all the 7 layers of the...
Which of the following models for hosting a Database server is most...
Which of the following accounts should be renamed for network...
Which of the following communications does not use the 2.4 GHz...
Which of the following firewall types will allow for port security?
Which of the following is the best way to obtain vulnerability related...
The Stateful inspection firewall, monitors connection status based on...
Which of the following will be verified first for an incoming packet?
Which of the following would not help with dedicated authentication to...
Alert!

Advertisement