lacretion gailliard
Quiz by , created more than 1 year ago

Quiz on CompTIA Security +, created by lacretion gailliard on 21/07/2017.

13
1
0
lacretion gailliard
Created by lacretion gailliard almost 7 years ago
Close

CompTIA Security +

Question 1 of 10

1

A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called:

Select one of the following:

  • antivirus

  • Firewall

  • Antispyware

  • Malware

Explanation

Question 2 of 10

1

A type of Intrusion Detection System (IDS) that relies on the previously established baseline of normal network activity in order to detect intrusions is known as a signature-based IDS.

Select one of the following:

  • True
  • False

Explanation

Question 3 of 10

1

Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?

Select one of the following:

  • IDS

  • EFS

  • TPM

  • AES

Explanation

Question 4 of 10

1

What is another name given to the window security log events?

Select one of the following:

  • Audit trail

  • System Event

  • System Trails

  • Application Trail

Explanation

Question 5 of 10

1

What is the biggest threat to an organization security ?

Select one of the following:

  • Insider

  • Piggyback

  • Brute force

  • Social engineering

Explanation

Question 6 of 10

1

802.1x is an IEEE standard defining:

Select one of the following:

  • Token ring networks

  • Port-based network access control

  • VLAN tagging

  • Wireless networking

Explanation

Question 7 of 10

1

What is the mitigation action organization take to Defend against risk?

Select one of the following:

  • Due diligence

  • Off boarding

  • Due Care

  • Due Process

Explanation

Question 8 of 10

1

What encryption should you use for commutation with a Wi-FI router?

Select one of the following:

  • WPA2

  • DES

  • WEP

  • WPA

Explanation

Question 9 of 10

1

Which of the following acronyms refers to a firewall controlling access to a web server?

Select one of the following:

  • WEP

  • WAP

  • WPS

  • WAF

Explanation

Question 10 of 10

1

Which of the following actions can be taken by passive IDS? (Select 2 answers)

Select one or more of the following:

  • Firewall reconfiguration

  • Closing down connection

  • Logging

  • Terminating process

  • Sending an alert

Explanation