Security + practice exam

Beschreibung

CompTIA Security+ Exam SY0-401 All 12 practice tests in one spot
Crozeph Rede
Quiz von Crozeph Rede, aktualisiert more than 1 year ago
Crozeph Rede
Erstellt von Crozeph Rede vor mehr als 9 Jahre
409
8

Zusammenfassung der Ressource

Frage 1

Frage
Which of the following policies applies to any requests that fall outside the criteria defined in an ACL?
Antworten
  • Non-repudiation
  • Implicit deny policy
  • Acceptable use policy
  • Post-admission NAC

Frage 2

Frage
A lightly protected subnet placed on the outside of the company's firewall consisting of publicly available servers is known as:
Antworten
  • VPN
  • Access Point (AP)
  • VLAN
  • DMZ

Frage 3

Frage
Which part of the 192.168.1.5/24 address identifies its network ID?
Antworten
  • 192
  • 192.168
  • 192.168.1
  • 192.168.1.5

Frage 4

Frage
Which of the following acronyms refers to a solution allowing companies to cut costs related to managing of internal calls?
Antworten
  • PBX
  • POTS
  • P2P
  • PSTN

Frage 5

Frage
A solution that allows to make phone calls over a broadband Internet connection instead of typical analog telephone lines is known as:
Antworten
  • IMAP
  • VoIP
  • POTS
  • ITCP

Frage 6

Frage
Which of the following answers lists a /27 subnet mask?
Antworten
  • 255.255.255.0
  • 255.255.255.128
  • 255.255.255.192
  • 255.255.255.224

Frage 7

Frage
What type of system can be compromised through phreaking?
Antworten
  • ATX
  • PGP
  • PBX
  • BIOS

Frage 8

Frage
Which of the following terms refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain, regardless of their physical location?
Antworten
  • DMZ
  • Virtualization
  • VLAN
  • SNMP

Frage 9

Frage
Which security measure is in place when a client is denied access to the network due to outdated antivirus software?
Antworten
  • NAC
  • DMZ
  • VLAN
  • NAT

Frage 10

Frage
Which of the following terms refers to a technology that allows multiple operating systems to work simultaneously on the same hardware?
Antworten
  • Hyperthreading
  • Virtualization
  • Multi core
  • Combo drive

Frage 11

Frage
A security stance whereby a host is being granted / denied permissions based on its actions after it has been provided with the access to the network is known as:
Antworten
  • Network separation
  • Pre-admission NAC
  • Quarantine
  • Post-admission NAC

Frage 12

Frage
Which of the following solutions is used to hide the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
Antworten
  • NAC
  • ACL
  • NAT
  • DMZ

Frage 13

Frage
VLAN membership can be set through: (Select all that apply)
Antworten
  • Trunk port
  • Group permissions
  • Encryption
  • MAC address

Frage 14

Frage
In which of the cloud computing infrastructure types clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment?
Antworten
  • IaaS
  • SaaS
  • P2P
  • PaaS

Frage 15

Frage
Which of the following cloud service types would provide the best solution for a web developer intending to create a web app?
Antworten
  • SaaS
  • API
  • PaaS
  • IaaS

Frage 16

Frage
A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers is called:
Antworten
  • Thick client
  • SaaS
  • Virtualization
  • IaaS

Frage 17

Frage
The biggest advantage of public cloud is that all services provided through this type of cloud computing service model are offered free of charge.
Antworten
  • True
  • False

Frage 18

Frage
A concept of effective security posture employing multiple tools and different techniques to slow down an attacker is known as: (Select 2 answers)
Antworten
  • Vulnerability scanning
  • Layered security
  • Authorization
  • Principle of least privilege
  • Defense in depth

Frage 19

Frage
Which of the IPsec modes provides entire packet encryption?
Antworten
  • Tunnel
  • Payload
  • Transport
  • Default

Frage 20

Frage
Which of the following protocols is used in network management systems for monitoring network-attached devices?
Antworten
  • RTP
  • SNMP
  • IMAP
  • STP

Frage 21

Frage
Which of the following protocols transmit data in an unencrypted form? (Select all that apply)
Antworten
  • SCP
  • IPsec
  • SNMPv1
  • FTP
  • Telnet
  • SFTP

Frage 22

Frage
A group that consists of SNMP devices and one or more SNMP managers is known as:
Antworten
  • SNMP trap
  • Network Management System (NMS)
  • SNMP community
  • Management Information Base (MIB)

Frage 23

Frage
Which of the following protocols was designed as a secure replacement for Telnet?
Antworten
  • ICMP
  • FTP
  • IPv6
  • SSH

Frage 24

Frage
A system used to convert a computer's host name into an IP address on the Internet is known as:
Antworten
  • DNS
  • NetBIOS
  • TLS
  • ICMP

Frage 25

Frage
DNS database AAAA record identifies:
Antworten
  • Mail server
  • IPv4 address
  • Canonical name
  • IPv6 address

Frage 26

Frage
Which of the following protocols are used for securing HTTP connections? (Select 2 answers)
Antworten
  • SCP
  • Telnet
  • SSL
  • SNMP
  • TLS

Frage 27

Frage
Which of the following answers refers to a suite of protocols used for connecting hosts on the Internet?
Antworten
  • NetBIOS
  • IPv4
  • TCP/IP
  • LAN

Frage 28

Frage
FTPS is an extension to the FTP that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.
Antworten
  • True
  • False

Frage 29

Frage
The SCP protocol is used for:
Antworten
  • Directory access
  • Secure file transfer
  • Network addressing
  • Sending emails

Frage 30

Frage
Which of the protocols listed below is used by the PING utility?
Antworten
  • TLS
  • SNMP
  • FCoE
  • ICMP

Frage 31

Frage
Which of the following answers lists the IPv6 loopback address?
Antworten
  • ::/128
  • FF00::/8
  • ::1
  • 127.0.0.1

Frage 32

Frage
Which of the following answers refers to a networking standard for linking data storage devices over an IP network?
Antworten
  • iSCSI
  • SSD
  • TPM
  • LDAP

Frage 33

Frage
Which of the following protocols facilitate communication between SAN devices? (Select 2 answers)
Antworten
  • MTBF
  • TFTP
  • iSCSI
  • HTTPS
  • FCoE

Frage 34

Frage
The FTP protocol is designed for:
Antworten
  • Sending email messages between servers
  • Serving web pages
  • Translating domain names into IP addresses
  • File exchange

Frage 35

Frage
Which of the protocols listed below does not provide authentication?
Antworten
  • FTP
  • TFTP
  • SCP
  • SFTP

Frage 36

Frage
Which of the following protocols was designed as a secure replacement for Telnet?
Antworten
  • FTP
  • IPv6
  • SSH
  • ICMP

Frage 37

Frage
FTP runs by default on ports: (Select 2 answers)
Antworten
  • 25
  • 23
  • 20
  • 21
  • 22

Frage 38

Frage
Which of the following protocols run(s) on port number 22? (Select all that apply)
Antworten
  • FTP
  • SSH
  • SMTP
  • SCP
  • SFTP

Frage 39

Frage
Port number 23 is used by:
Antworten
  • SMTP
  • SSH
  • Telnet
  • TFTP

Frage 40

Frage
Which of the following TCP ports is used by SMTP?
Antworten
  • 25
  • 53
  • 80
  • 23

Frage 41

Frage
DNS runs on port:
Antworten
  • 139
  • 53
  • 443
  • 22

Frage 42

Frage
Which of the following ports enables HTTP traffic?
Antworten
  • 110
  • 88
  • 143
  • 80

Frage 43

Frage
Which of the following ports enable(s) retrieving email messages from a remote server? (Select all that apply)
Antworten
  • 80
  • 139
  • 110
  • 443
  • 143

Frage 44

Frage
Which of the port numbers listed below are used by NetBIOS? (Select all that apply)
Antworten
  • 137
  • 161
  • 138
  • 162
  • 139

Frage 45

Frage
IMAP runs on TCP port:
Antworten
  • 143
  • 25
  • 443
  • 110

Frage 46

Frage
Which of the following TCP ports is used by HTTPS?
Antworten
  • 80
  • 443
  • 53
  • 143

Frage 47

Frage
Which of the following answers lists the default port number for a Microsoft-proprietary remote connection protocol?
Antworten
  • 139
  • 443
  • 3389
  • 53

Frage 48

Frage
Which of the following protocols operate(s) at layer 3 (the network layer) of the OSI model? (Select all that apply)
Antworten
  • IPSec
  • IPv6
  • HTTP
  • IPv4
  • IMAP
  • ICMP

Frage 49

Frage
In the OSI model, TCP resides at the:
Antworten
  • Physical layer
  • Network layer
  • Application layer
  • Transport layer

Frage 50

Frage
A network protocol for secure file transfer over secure shell is called:
Antworten
  • FCoE
  • SFTP
  • Telnet
  • TFTP

Frage 51

Frage
Which of the following wireless encryption schemes offers the highest level of protection?
Antworten
  • WEP
  • WPA2
  • WAP
  • WPA

Frage 52

Frage
Which of the wireless security protocols listed below has been deprecated in favor of newer standards due to known vulnerabilities?
Antworten
  • PEAP
  • CCMP
  • WPA2
  • WEP

Frage 53

Frage
Which of the following answers refers to an authentication framework frequently used in wireless networks and point-to-point connections?
Antworten
  • DLP
  • OCSP
  • EAP
  • LDAP

Frage 54

Frage
A network access control method whereby the 48-bit address assigned to each network card is used to determine access to the network is known as:
Antworten
  • EMI shielding
  • Hardware lock
  • MAC filter
  • Quality of Service (QoS)

Frage 55

Frage
Which of the following acronyms refers to a wireless network name?
Antworten
  • SSID
  • WAP
  • SSO
  • HVAC

Frage 56

Frage
Which of the following protocols was introduced to strengthen existing WEP implementations without requiring the replacement of legacy hardware?
Antworten
  • PEAP
  • TKIP
  • CCMP
  • WPA2

Frage 57

Frage
Disabling SSID broadcast:
Antworten
  • Is one of the measures used for securing networks
  • Makes a WLAN harder to discover
  • Blocks access to WAP
  • Prevents wireless clients from accessing the network

Frage 58

Frage
Which of the following protocols encapsulates EAP within an encrypted and authenticated TLS tunnel?
Antworten
  • LDAP
  • PAP
  • Telnet
  • PEAP

Frage 59

Frage
AES-based encryption mode implemented in WPA2 is known as:
Antworten
  • CCMP
  • TPM
  • TKIP
  • MTBF

Frage 60

Frage
An optimal WAP antenna placement provides a countermeasure against: (Select 2 answers)
Antworten
  • War chalking
  • Tailgating
  • War driving
  • Shoulder surfing
  • Site survey

Frage 61

Frage
Which of the following WAP configuration settings allows for adjusting the boundary range of the wireless signal?
Antworten
  • Beacon frame
  • Power level controls
  • Quality of Service (QoS)
  • MAC filtering

Frage 62

Frage
Which of the following answers refers to a solution allowing administrators to block Internet access for users until they perform required action?
Antworten
  • Access logs
  • Mantrap
  • Post-admission NAC
  • Captive portal

Frage 63

Frage
Which of the following antenna types would provide the best coverage for workstations connecting to a WAP placed in a central point of a typical office? (Select all that apply)
Antworten
  • Omnidirectional
  • Unidirectional
  • Bidirectional
  • Non-directional

Frage 64

Frage
Which of the following is an example of a wireless site survey?
Antworten
  • Bluejacking
  • Spear phishing
  • War driving
  • Shoulder surfing

Frage 65

Frage
Which of the following examples falls into the category of technical security controls?
Antworten
  • Change management
  • Acceptable use policy
  • Intrusion detection system
  • Incident response procedure

Frage 66

Frage
An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of:
Antworten
  • Fault tolerance
  • False positive error
  • Incident isolation
  • False negative error

Frage 67

Frage
Which of the following examples falls into the category of operational security controls?
Antworten
  • Change management
  • Encryption
  • Antivirus software
  • Mantrap

Frage 68

Frage
Which of the following terms refers to a situation where no alarm is raised when an attack has taken place?
Antworten
  • False negative
  • True positive
  • False positive
  • True negative

Frage 69

Frage
A policy outlining ways of collecting and managing personal data is known as:
Antworten
  • Acceptable use policy
  • Audit policy
  • Privacy policy
  • Data loss prevention

Frage 70

Frage
Which of the following acronyms refers to a set of rules enforced in a network that restrict the use to which the network may be put?
Antworten
  • OEM
  • AUP
  • UAT
  • ARO

Frage 71

Frage
One of the goals behind the mandatory vacations policy is to mitigate the occurrence of fraudulent activity within the company.
Antworten
  • True
  • False

Frage 72

Frage
Which of the following answers refers to a concept of having more than one person required to complete a given task?
Antworten
  • Acceptable use policy
  • Privacy policy
  • Multifactor authentication
  • Separation of duties

Frage 73

Frage
A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as:
Antworten
  • Order of volatility
  • Principle of least privilege
  • Privacy policy
  • Single sign-on

Frage 74

Frage
Which of the following acronyms refers to a risk assessment formula defining probable financial loss due to a risk over a one-year period?
Antworten
  • ARO
  • ALE
  • SLE
  • UAT

Frage 75

Frage
Single Loss Expectancy (SLE) = Asset Value (AV) x Exposure Factor (EF) The Exposure Factor (EF) used in the formula above refers to the impact of the risk over the asset, or percentage of asset lost when a specific threat is realized. Which of the following answers lists the EF value for an asset that is entirely lost?
Antworten
  • 0
  • 100
  • 1.0
  • 0.1

Frage 76

Frage
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called
Antworten
  • Antivirus
  • Firewall
  • Antispyware
  • Malware

Frage 77

Frage
A device designed to forward data packets between networks is called
Antworten
  • Switch
  • Hub
  • Router
  • MAC filter

Frage 78

Frage
Allowing a program through a firewall is known as creating
Antworten
  • Tunnel
  • Entry
  • Access Point (AP)
  • Exception

Frage 79

Frage
A network device designed for managing the optimal distribution of workloads across multiple computing resources is called
Antworten
  • Load balancer
  • HIDS
  • Firewall
  • Captive portal

Frage 80

Frage
The last default rule on a firewall is to
Antworten
  • Create an exception
  • Allow all traffic
  • Deny all traffic
  • Unblock all ports

Frage 81

Frage
A computer network service that allows clients to make indirect network connections to other network services is called
Antworten
  • Load balancer
  • Proxy
  • Network Access Control (NAC)
  • Backdoor

Frage 82

Frage
A solution designed for filtering malicious / restricted content from entering corporate networks is known as
Antworten
  • MAC filter
  • Subnetting
  • HIPS
  • Web security gateway

Frage 83

Frage
One of the measures for securing networking devices includes the practice of disabling unused ports
Antworten
  • True
  • False

Frage 84

Frage
What type of protocols ensure the privacy of a VPN connection?
Antworten
  • OSPF
  • IPv6
  • Tunneling
  • Telnet

Frage 85

Frage
Which of the following answers refers to a dedicated device for managing secure connections established over an untrusted network, such as the Internet?
Antworten
  • Load balancer
  • VPN concentrator
  • Spam filter
  • Web server

Frage 86

Frage
Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
Antworten
  • IDS
  • AES
  • TPM
  • EFS

Frage 87

Frage
A software tool used to monitor and examine contents of network traffic is known as: (Select all that apply)
Antworten
  • Port scanner
  • Packet sniffer
  • Vulnerability scanner
  • Protocol analyzer

Frage 88

Frage
Which of the following answers list the protocol and port number used by a spam filter? (Select 2 answers)
Antworten
  • HTTPS
  • 23
  • SMTP
  • 443
  • TELNET
  • 25

Frage 89

Frage
Which of the following acronyms refers to a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection?
Antworten
  • MTU
  • STP
  • UTM
  • XML

Frage 90

Frage
Which of the following network security solutions inspects network traffic in real-time and has the capability to stop the ongoing attack?
Antworten
  • NIPS
  • HIDS
  • HIPS
  • NIST

Frage 91

Frage
Which of the following answers refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
Antworten
  • CRL
  • NAT
  • BCP
  • ACL

Frage 92

Frage
Which of the following actions can be taken by passive IDS? (Select 2 answers)
Antworten
  • Reconfiguring firewall
  • Closing down connection
  • Logging
  • Terminating process
  • Sending an alert

Frage 93

Frage
802.1x is an IEEE standard defining
Antworten
  • Token ring networks
  • Port-based network access control
  • VLAN tagging
  • Wireless networking

Frage 94

Frage
An access control model in which access to resources is granted or denied depending on Access Control List (ACL) entries is also known as
Antworten
  • Mandatory Access Control
  • Lattice-Based Access Control
  • Role-Based Access Control
  • Rule-Based Access Control

Frage 95

Frage
Which type of Intrusion Detection System (IDS) relies on the previously established baseline of normal network activity in order to detect intrusions?
Antworten
  • Signature-based
  • URL filter
  • Anomaly-based
  • ACL

Frage 96

Frage
Which of the following security solutions provides a countermeasure against denial-of-service attack characterized by increasing number of half-open connections?
Antworten
  • Flood guard
  • MAC filter
  • Port scanner
  • Honeypot

Frage 97

Frage
Which of the following protocols protects against switching loops?
Antworten
  • UTP
  • SSH
  • STP
  • HMAC

Frage 98

Frage
Which type of Intrusion Detection System (IDS) relies on known attack patterns to detect an intrusion?
Antworten
  • Load balancer
  • Signature-based
  • Protocol analyzer
  • Anomaly-based

Frage 99

Frage
URL filtering restricts access to Internet sites based on which of the following criteria?
Antworten
  • Virus signature
  • Web address
  • Baseline
  • Data content

Frage 100

Frage
Which of the following acronyms refers to a firewall controlling access to a web server?
Antworten
  • WPS
  • WEP
  • MTBF
  • WAF
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CompTIA Security+
michael smith0754
SY0-401 Part 1 (50 questions)
desideri
Security + Practice
Elise Berg
Ch 3 - Basic Cryptography
C Danvers
Ch 5 - Networking & Server Attacks
C Danvers
Ch 6 - Network Security Devices, Design, and Technology
C Danvers
Ch 7 - Administering a Secure Network
C Danvers
Ch 4 - Advanced Cryptography
C Danvers
Ch 2 - Malware & Social Engineering
C Danvers
CH3: OSI Layers, Devices, and Protocols
Brent Jerdo
CH3: Well-Known Ports
Brent Jerdo