Set 2 CompTIA Security+ Exam Practice: Securing Communication & Infrastructure

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 614,575
Questions: 22 | Attempts: 2,771

SettingsSettingsSettings
Set 2 CompTIA Security+ Exam Practice: Securing Communication & Infrastructure - Quiz

This is Set 2 of 4 of practice questions for Comptia Security+ exam. This set covers the exam objective Securing Communication & other Infrastructure. You can take these for practice or take it as a topic wise practice exam. Read the questions carefully and answer. So, let's try out the quiz. All the best! Feedback and comments are welcome!


Questions and Answers
  • 1. 

    Which of the following accepts authentication requests from remote clients?

    • A.

      Authenticating server

    • B.

      RADIUS Server

    • C.

      HTTP Server

    • D.

      File Server

    Correct Answer
    B. RADIUS Server
    Explanation
    The RADIUS server would be challenging the users request first, the request may then be received by any of the internal servers later.

    Rate this question:

  • 2. 

    Which of the following can be used to provide security for a VPN?

    • A.

      PPTP

    • B.

      IPSec

    • C.

      Kerberos

    • D.

      Certificate

    Correct Answer
    B. IPSec
    Explanation
    IPSec is a security protocol that can be implemented on any IP-based setup. It is ideal VPN security solution.

    Rate this question:

  • 3. 

    Which of the following would not help with dedicated authentication to dial-in clients?

    • A.

      RRAS

    • B.

      RADIUS

    • C.

      IAS

    • D.

      None of the above

    Correct Answer
    A. RRAS
    Explanation
    RRAS is a Microsoft based Router-cum-RAS service.

    Rate this question:

  • 4. 

    L2TP can work over IPX based networks. Y/N?

    • A.

      Yes

    • B.

      No

    Correct Answer
    A. Yes
    Explanation
    L2TP (Layer 2 Tunneling Protocol) was created by Cisco as well as Microsoft. It is meant to function over IP, IPX and SNA networks.

    Rate this question:

  • 5. 

    Which of the following is the best way to obtain vulnerability related information for database servers?

    • A.

      Write to the respective vendor at frequent intervals

    • B.

      Look up related web sites

    • C.

      Look up news bulletins

    • D.

      None of the above

    Correct Answer
    B. Look up related web sites
    Explanation
    There are web sites that keep updating vulnerability information for different platforms. It is ideal to constantly browse these sites to obtain required information.

    Rate this question:

  • 6. 

    Infrared rays have a wide and far reachability. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The Infrared communication requires line of sight. The device that intends communication will have to be placed in the line of sight for communication to be possible.

    Rate this question:

  • 7. 

    A Modem modulates and demodulates data signals. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    As the name suggests the modem mainly modulates and demodulates signals, it is responsible for converting the analog signals of the telephone to the digital signals required by the PC and vice versa.

    Rate this question:

  • 8. 

    An RJ-11 connector would belong to which of the following layers?

    • A.

      Physical layer

    • B.

      Datalink layer

    • C.

      Network Layer

    • D.

      None of the above

    Correct Answer
    A. pHysical layer
    Explanation
    RJ-11 connector belongs to the physical layer. The physical layer sets rules for connectivity and signal strength.

    Rate this question:

  • 9. 

    Which of the following communications does not use the 2.4 GHz frequency?

    • A.

      Wireless 802.11b and g

    • B.

      Microwave

    • C.

      Radio frequency

    • D.

      All of the above

    Correct Answer
    C. Radio frequency
    Explanation
    The microwave and the Wireless 802.11g and b all operate on the 2.4 GHz range. Radio frequency does not use the 2.4 GHz range.

    Rate this question:

  • 10. 

    Which of the following firewall types will allow for port security?

    • A.

      Stateful Inspection

    • B.

      Packet filtering

    • C.

      Application filtering

    • D.

      None of the above

    Correct Answer
    B. Packet filtering
    Explanation
    Port filtering is done in packet filtering firewall types. Application filtering is irrelevant.

    Rate this question:

  • 11. 

    Which of the following is capable of functioning as a Firewall?

    • A.

      NAT box

    • B.

      Router

    • C.

      PC

    • D.

      Switch

    Correct Answer
    B. Router
    Explanation
    The Router is capable of acting as a firewall as it can do filtering using ACL.

    Rate this question:

  • 12. 

    The Stateful inspection firewall, monitors connection status based on the routing table. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The Stateful inspection firewall, monitors connection status based on the state table.

    Rate this question:

  • 13. 

    Stateful inspection firewall will operate on all the 7 layers of the OSI reference model. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Stateful Inspection firewall will not operate on all the & layers of OSI reference mode.

    Rate this question:

  • 14. 

    An Access policy is nothing but the access control list. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The access control list may be created based on what the access policy dictates.

    Rate this question:

  • 15. 

    Which of the following firewall policies is most restrictive?

    • A.

      Any any

    • B.

      Deny all

    • C.

      Permit all

    • D.

      None of the above

    Correct Answer
    B. Deny all
    Explanation
    The �deny all� is the most restrictive statement that is implicitly defined in the fireall when no other statement is configured. This will get applied to all packets that do not match with the criteria mentioned in the list above the �deny all� statement.

    Rate this question:

  • 16. 

    Which of the following will be verified first for an incoming packet?

    • A.

      Protocol information

    • B.

      Source address

    • C.

      Destination address

    • D.

      No of bytes in the header

    Correct Answer
    C. Destination address
    Explanation
    The firewall will first look at the destination address.

    Rate this question:

  • 17. 

    Port number 110 relates to Web services. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Port number 80 relates to Web services

    Rate this question:

  • 18. 

    OS hardening is not possible on web servers. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    OS hardening is very much possible and essential for Web server.

    Rate this question:

  • 19. 

    Which of the following models for hosting a Database server is most secure?

    • A.

      Two-tier model

    • B.

      Three-tier model

    • C.

      Centralized model

    • D.

      None of the above

    Correct Answer
    B. Three-tier model
    Explanation
    A three-tier model ensures security to your database server as the database server cannot be directly accessed in this model.

    Rate this question:

  • 20. 

    Which of the following accounts should be renamed for network resources safety?

    • A.

      Guest account

    • B.

      Backup operator account

    • C.

      Every user account

    • D.

      None of the above

    Correct Answer
    A. Guest account
    Explanation
    A guest account has to be renamed so that an intruder cannot guess the user name for the guest account and try to use it to access the network. Renaming admin account is also recommended (but that is not an option stated in the question)

    Rate this question:

  • 21. 

    Port number for internal web server is 80. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The port number 80 is the default HTTP port to which clients connect. This is also used for internal webserver.

    Rate this question:

  • 22. 

    FAT is the most secure of all Microsoft based file system. Y/N?

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    NTFS is the most secure of all Microsoft based file system.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 18, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 18, 2006
    Quiz Created by
    Vaibhav Agarwal
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.