michael smith0754
Test por , creado hace más de 1 año

CompTIA Security+ PreTest

416
10
0
michael smith0754
Creado por michael smith0754 hace más de 8 años
Cerrar

CompTIA Security+

Pregunta 1 de 19

1

Which of the following security tools can Jane, a security administrator, use to deter theft?

Selecciona una de las siguientes respuestas posibles:

  • Visualization

  • Cable locks

  • GPS tracking

  • Device encryption

Explicación

Pregunta 2 de 19

1

Which of the following can be implemented on a laptop hard drive to help prevent unauthorized access to data?

Selecciona una de las siguientes respuestas posibles:

  • Full disk encryption

  • Key escrow

  • Screen lock

  • Data loss prevention

Explicación

Pregunta 3 de 19

1

Which of the following network devices allows Jane, a security technician, to perform malware inspection?

Selecciona una de las siguientes respuestas posibles:

  • Load balancer

  • VPN concentrator

  • Firewall

  • NIPS

Explicación

Pregunta 4 de 19

1

Which of the following is a valid server-role in a Kerberos authentication system?

Selecciona una de las siguientes respuestas posibles:

  • Token issuing system

  • Security assertion server

  • Authentication agent

  • Ticket granting server

Explicación

Pregunta 5 de 19

1

The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. Jane, an administrative assistant, needs access to view one document in network share A to gather data for management reports. Which of the following gives accounting and Jane the correct rights to these areas?

Selecciona una de las siguientes respuestas posibles:

  • Accounting should be given read/write access to network share A and read access to network share B. Jane should be given read access for the specific document on network share A.

  • Accounting should be given read/write access to network share A and read access to network share B. Jane should be given read access to network share A.

  • Accounting should be given full access to network share A and read access to network share B. Jane should be given read/write access for the specific document on network share A.

  • Accounting should be given full access to network share A and read access to network share B. Jane should be given read/write access to network share A.

Explicación

Pregunta 6 de 19

1

Which of the following creates ciphertext by changing the placement of characters?

Selecciona una de las siguientes respuestas posibles:

  • Transposition cryptography

  • Hashing

  • Elliptical cryptography

  • Digital signatures

Explicación

Pregunta 7 de 19

1

Which of the following malware types uses stealth techniques to conceal itself, cannot install itself without user interaction, and cannot automatically propagate?

Selecciona una de las siguientes respuestas posibles:

  • Rootkit

  • Logic bomb

  • Adware

  • Virus

Explicación

Pregunta 8 de 19

1

When Pete, an employee, leaves a company, which of the following should be updated to ensure Pete's security access is reduced or eliminated?

Selecciona una de las siguientes respuestas posibles:

  • RSA

  • CA

  • PKI

  • CRL

Explicación

Pregunta 9 de 19

1

Which of the following should Matt, an administrator, change FIRST when installing a new access point?

Selecciona una de las siguientes respuestas posibles:

  • SSID broadcast

  • Encryption

  • DHCP addresses

  • Default password

Explicación

Pregunta 10 de 19

1

A datacenter has two rows of racks which are facing the same direction. Sara, a consultant, recommends the racks be faced away from each other. This is an example of which of the following environmental concepts?

Selecciona una de las siguientes respuestas posibles:

  • Fire suppression

  • Raised floor implementation

  • Hot and cool aisles

  • Humidity controls implementation

Explicación

Pregunta 11 de 19

1

Which of the following password policies is the MOST effective against a brute force network attack?

Selecciona una de las siguientes respuestas posibles:

  • Password complexity

  • Password recovery

  • 30 day password expiration

  • Account lockout

Explicación

Pregunta 12 de 19

1

Which of the following would BEST be used by Sara, the security administrator, to calculate the likelihood of an event occurring?

Selecciona una de las siguientes respuestas posibles:

  • SLE

  • ALE

  • ROI

  • ARO

Explicación

Pregunta 13 de 19

1

Which of the following should Matt, an administrator, implement in a server room to help prevent static electricity?

Selecciona una de las siguientes respuestas posibles:

  • GFI electrical outlets

  • Humidity controls

  • ESD straps

  • EMI shielding

Explicación

Pregunta 14 de 19

1

Sara, a company's security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building Sara should immediately implement which of the following?

Selecciona una de las siguientes respuestas posibles:

  • Acceptable Use Policy

  • Physical security controls

  • Technical controls

  • Security awareness training

Explicación

Pregunta 15 de 19

1

Pete, an IT security technician, has been tasked with implementing physical security controls for his company's workstations. Which of the following BEST meets this need?

Selecciona una de las siguientes respuestas posibles:

  • Host-based firewalls

  • Safe

  • Cable locks

  • Remote wipe

Explicación

Pregunta 16 de 19

1

Which of the following creates ciphertext by replacing one set of characters for another?

Selecciona una de las siguientes respuestas posibles:

  • Substitution cryptography

  • Elliptical cryptography

  • Digital signatures

  • Transposition cryptography

Explicación

Pregunta 17 de 19

1

Sara, the IT Manager, would like to ensure that the router and switches are only available from the network administrator's workstation. Which of the following would be the MOST cost effective solution to ensure that only the network administrator can access these devices?

Selecciona una de las siguientes respuestas posibles:

  • Restrict console ports

  • Time of day restrictions

  • Implement ACLs

  • Implement an out-of-band administrative network

Explicación

Pregunta 18 de 19

1

A company is performing internal security audits after a recent exploitation on one of their proprietary applications. Sara, the security auditor, is given the workstation with limited documentation regarding the application installed for the audit. Which of the following types of testing methods is this?

Selecciona una de las siguientes respuestas posibles:

  • Sandbox

  • White box

  • Black box

  • Gray box

Explicación

Pregunta 19 de 19

1

A web server sitting in a secure DMZ has antivirus and anti-malware software which updates daily. The latest security patches are applied and the server does not run any database software. A day later, the web server is compromised and defaced. Which of the following is the MOST likely type of attack?

Selecciona una de las siguientes respuestas posibles:

  • Header manipulation

  • Zero day exploit

  • Session hijacking

  • SQL injection

Explicación