| < Day Day Up > |
|
The questions in this practice exam are based on topics that have been presented to you in Chapters 2 through 9 of this book. The answers to the following questions as well as the chapter headers they are taken from are provided at the end of the exam.
If you can answer all of the questions in this practice exam and the practice exams included with the accompanying CD-ROM correctly, as well as understand the theory behind each of the topics mentioned, there is a good possibility that you may pass the CompTIA Security+ examination.
Note | This exam is more difficult than the real Security+ exam. So suit up, put your foot soldier’s armor on, pass this test, and then go take the real one. Good luck! |
1. | Which of the following suggestions should not be taken when creating a strong password?
|
|
2. | Which of the following best describes two-factor authentication?
|
|
3. | Which access control security model supports the following statement?
|
|
4. | Which of the following can allow users access to enterprise-wide resources with one sign-on?
|
|
5. | Which of the following is currently the most secure biometric device available?
|
|
6. | Which of the following is not a valid file system access right?
|
|
7. | Which access control type is based on the roles users play within an organization?
|
|
8. | Which of the following is a protocol used to transfer authentication and authorization data between a dial-in client and a server that supports PAP, CHAP, PPP, and UNIX login authentication methods?
|
|
9. | Developed by Cisco©, which remote authentication protocol is typically implemented on UNIX servers?
|
|
10. | Which of the following services and protocols should you consider removing from a system if they are not needed?
|
|
11. | When someone pretends to be someone else in order to gain information or unauthorized access, what are they practicing?
|
|
12. | If you are using UNIX, it would be considered good practice to audit which of the following items?
|
|
13. | By default, where are passwords stored in UNIX?
|
|
14. | Which of the following guidelines should you follow when using RAS?
|
|
15. | What does 802.1X technology use that enables it to work with wireless, Ethernet, and Token Ring networks?
|
|
16. | What is the main function of S/MIME?
|
|
17. | Which of the following are commonly used security protocols that provide transport security through Internet browsers provided by Netscape and Microsoft?
|
|
18. | Which technique is often used to quarantine applets that appear suspicious or malicious?
|
|
19. | Which is the most secure type of FTP?
|
|
20. | Certified engineers that can properly recommend and assist you with integration plans as well as keep you in line with federal, state, and local regulations regarding wireless networks will typically perform what?
|
|
21. | This layer establishes, holds, and controls connections between two applications. It provides checkpoint and synchronization service between two communication connections. Security between two connections is also handled at this layer. Which OSI layer is being described?
|
|
22. | Which statement is not true concerning FDDI rings?
|
|
23. | When part of an internal network has been made accessible to outside sources, that part of the internal network is referred to as?
|
|
24. | Of the following, which is the process of establishing a known footprint or baseline of a system’s usage of such things as CPU (Central Processing Unit) utilization, disk utilization, use of user rights, user logins, file and folder access over time, and analyzing the system for any deviation from the system’s baseline or “normal” behavior?
|
|
25. | A solid incident response procedure should include which of the following items?
|
|
26. | The advantage of this type of router is its ability to analyze and drop or pass packets quickly. The major disadvantage of this technology is that packets are not typically analyzed beyond source and destination addresses. What type of firewall or router is being described?
|
|
27. | Which of the following best describes DMZ?
|
|
28. | Which of the following are not physical controls that are not commonly implemented in order to place a “barrier” or form of protection between unauthorized personal and sensitive locations or data?
|
|
29. | Which of the following are important considerations when determining a new site location for your company or business?
|
|
30. | Which of the following types of extinguishers are the most common and are considered effective at extinguishing chemical, electrical, and normal wood burning fires?
|
|
31. | Which backup strategy is the most efficient for backups and that includes a daily, weekly, and monthly backup schedule?
|
|
32. | This provides excellent fault tolerance and good performance. It stores parity information across all disks in the disk array and provides concurrent disk reads and writes. It is the most popular RAID implementation. Which RAID level is it?
|
|
33. | The grouping together of independent servers into one large logical system is called what?
|
|
34. | In order to store passwords securely, some systems only maintain a copy of the password’s ______.
|
|
35. | One advantage of Digital Signatures (DSes) is that they can bind a person to an agreement. Which of the following describes what this aspect of a DS provides?
|
|
36. | Which of the following best describes the method used by an algorithm to produce subkeys?
|
|
37. | The cryptographic strength of the Diffie-Hellman algorithm is based on which mathematical problem?
|
|
38. | Which of the following is a disadvantage of incorporating DNSSEC with a DNS server?
|
|
39. | Which standard does a typical digital certificate conform to?
|
|
40. | If a company maintains copies of their employee’s crypto-keys, which type of key should they revoke first if the employee were to quit?
|
|
41. | Which component of an expert system acts as an intermediary and searches a knowledge base for patterns that are relevant to the user’s query?
|
|
42. | Which type of KBS attempts to emulate biological systems like the human brain?
|
|
43. | In the SDLC, which of the following describes user participation during beta testing?
|
|
44. | In a database, what is the function of a primary key?
|
|
45. | Web spiders that crawl around the Internet looking for data are known as which type of application?
|
|
46. | One method of hardening a mail server is to implement secure POP3 access. Which protocol is used to encrypt POP3 logons?
|
|
47. | The use of polyinstantiation without the proper database-wide updating can cause a loss in data ______.
|
|
48. | In a rule-based expert system, once a rule has been matched to a user’s query, which parameter defines the action to be taken?
|
|
49. | Which of the following computer laws prohibits eavesdropping by way of wire or oral communications?
|
|
50. | Which of the following is the most commonly committed computer crime?
|
|
51. | In order for a company to have or maintain an advantage over its competitor, what must not be divulged?
|
|
52. | This type of attack is not usually launched with the intent of producing a financial gain or causing harm. Younger enthusiasts such as college students and script kiddies most often carry this type of attack out. What type of attack is being described?
|
|
53. | When does the chain of evidence custody begin?
|
|
54. | Which of the following is located at Purdue University and is one of the largest computer security research groups in the world?
|
|
55. | Which of the following are good security practices when securing Microsoft Windows?
|
|
56. | Which of the following is usually associated with disgruntled employee syndrome, is also referred to as slag code, and is most often activated when a certain time is reached or a certain event occurs?
|
|
57. | Which of the following is not a remote administration, Trojan horse-style application?
|
|
58. | This was considered to be one of the first stealth viruses. It would first hide itself to avoid detection by virus scanners. It would then infect a hard drives boot sector. What was this virus called?
|
|
59. | Which of the following topologies is considered the most redundant?
|
|
60. | Digital signatures can provide proof that a transaction or contract has occurred so that it is not denied at a later time. What is being described here?
|
|
61. | What is used to limit a subject’s access to an object?
|
|
62. | Which of the following is a computer program (virus) designed to duplicate itself again and again until it exhausts system resources?
|
|
63. | These can be used to monitor network traffic and weaknesses and can also be used to steal passwords, user IDs, or credit card information. What are they?
|
|
64. | Hijackers and attackers often create or intercept these and use them to manipulate files on users computers. What are they?
|
|
65. | Which of the following represent benefits of implementing Single Sign-Ons?
|
|
66. | (BONUS QUESTION!) It is likely that the Security+ exam will expect you to have knowledge of which of the following viruses and the major virus category types they are associated with?
|
|
Answers
1. | E, Question Taken From Chapter 2, “Authentication” |
2. | A, Question Taken From Chapter 2, “Authentication” |
3. | B, Question Taken From Chapter 2, “Access Control Systems Fundamentals” |
4. | C, Question Taken From Chapter 2, “Authentication” |
5. | B, Question Taken From Chapter 2, “Authentication” |
6. | E, Question Taken From Chapter 2, “Authorization” |
7. | E, Question Taken From Chapter 2, “Access Control Techniques” |
8. | E, Question Taken From Chapter 2, “Access Control Techniques” |
9. | C, Question Taken From Chapter 2 “Access Control Techniques” |
10. | E, Question Taken From Chapter 2, “Nonessential Services and Protocols” |
11. | E, Question Taken From Chapter 2, “Attack Methods” |
12. | E, Question Taken From Chapter 2, “Auditing” |
13. | B, Question Taken From Chapter 9, “UNIX/Linux Security” |
14. | E, Question Taken From Chapter 3, “RAS (Remote Access Service)” |
15. | C, Question Taken From Chapter 3, “802.1X” |
16. | A, Question Taken From Chapter 3, “E, Question Taken From mail Security” |
17. | B, Question Taken From Chapter 3, “Web Security” |
18. | B, Question Taken From Chapter 3, “Web Security” |
19. | C, Question Taken From Chapter 3, “File Transfer” |
20. | D, Question Taken From Chapter 3, “Wireless Security” |
21. | C, Question Taken From Chapter 4, “Open Systems Interconnection (OSI) Model and Layers” |
22. | A, Question Taken From Chapter 4, “Network Topology” |
23. | C, Question Taken From Chapter 4, “Network Topology” |
24. | D, Question Taken From Chapter 4, “Intrusion Detection Systems (IDSes)” |
25. | E, Question Taken From Chapter 4, “Intrusion Detection Systems (IDSes)” |
26. | B, Question Taken From Chapter 4, “Network Countermeasures” |
27. | B, Question Taken From Chapter 4, “Network Countermeasures” |
28. | E, Question Taken From Chapter 6, “Physical Security” |
29. | E, Question Taken From Chapter 6, “Physical Security” |
30. | B, Question Taken From Chapter 6, “Physical Security” |
31. | C, Question Taken From Chapter 6, “Disaster Recovery” |
32. | D, Question Taken From Chapter 6, “Business Continuity” |
33. | C, Question Taken From Chapter 6, “Business Continuity” |
34. | D, Question Taken From Chapter 5, “Algorithms” |
35. | B, Question Taken From Chapter 5, “Concepts of Using Cryptography” |
36. | E, Question Taken From Chapter 5, “Algorithms” |
37. | B, Question Taken From Chapter 5, “Algorithms” |
38. | C, Question Taken From Chapter 5, “Standards and Protocols” |
39. | A, Question Taken From Chapter 5, “Public Key Infrastructure (PKI)” |
40. | D, Question Taken From Chapter 5, “Key Management/Certificate Lifecycle” |
41. | E, Question Taken From Chapter 7, “Knowledge, Question Taken From based Systems” |
42. | D, Question Taken From Chapter 7, “Knowledge, Question Taken From based Systems” |
43. | C, Question Taken From Chapter 7, “System Development Life Cycle (SDLC)” |
44. | A, Question Taken From Chapter 7, “Databases” |
45. | C, Question Taken From Chapter 7, “Applications” |
46. | B, Question Taken From Chapter 7, “Applications” |
47. | E, Question Taken From Chapter 7, “Databases” |
48. | B, Question Taken From Chapter 7, “Knowledge, Question Taken From based Systems” |
49. | C, Question Taken From Chapter 8, “Law” |
50. | A, Question Taken From Chapter 8, “Computer Crime” |
51. | C, Question Taken From Chapter 8, “Law” |
52. | E, Question Taken From Chapter 8, “Computer Crime” |
53. | C, Question Taken From Chapter 8, “Investigation” |
54. | E, Question Taken From Chapter 8, “Investigation” |
55. | F, Question Taken From Chapter 9, “Operating Systems Security” |
56. | C, Question Taken From Chapter 9, “Computer Virus Types” |
57. | A, Question Taken From Chapter 9, “Computer Virus Types” |
58. | D, Question Taken From Chapter 9, “Computer Virus Types” |
59. | C, Question Taken From Chapter 4, “Network Topology” |
60. | D, Question Taken From Chapter 2, “Basic Terminology” |
61. | A, Question Taken From Chapter 2, “Basic Terminology” |
62. | B, Question Taken From Chapter 2 “Basic Terminology” and Chapter 9, “Computer Virus Types” |
63. | D, Question Taken From Chapter 2, “Test Tips” |
64. | C, Question Taken From Chapter 3, “Test Tips” |
65. | E, Question Taken From Chapter 6, “Privilege Management” |
66. | F, Question Taken From Chapter 9, “Computer Virus Types” |
| < Day Day Up > |
|