














Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A comprehensive set of practice exam questions and answers for the comptia security+ certification exam. it covers a wide range of cybersecurity topics, including key management, authentication, access control, risk management, and network security. the questions are designed to test understanding of key concepts and best practices in the field, making it a valuable resource for students and professionals preparing for the security+ exam.
Typology: Exams
1 / 22
This page cannot be seen from the preview
Don't miss anything!
A. Decentralized key management
B. Centralized key management
C. Revocation key management
D. Multilevel key management โโA
A. Secure Sockets Layer 4
B. Point-to-Point Tunneling Protocol
C. Transport Layer Security
D. Internet Protocol Security โโC
A. Implicit denial
B. Least privilege
C. Separation of duties
D. Account expiration โโB
A. Something you have and something you are
B. Something you do and something you know
C. Something you know and something you are
D. Somewhere you are and something you have โโA
B. The NoSQL design uses server-side validation.
C. NoSQL databases lack confidentiality and integrity.
D. NoSQL databases are lacking in areas of scalability and performance. โโC
A. Mantrap
B. Biometric
C. Honeypot
D. Honeynet โโA
A. Wi-Fi
B. Bluetooth
C. Blu-Fi
D. All of the above โโB
A. Mandatory vacations
B. Least privilege
C. Separation of duties
D. Job rotation โโB
A. Password length set to 6 characters
B. Require password change at 90 days
C. Maximum password age set to zero
D. Account lockout threshold set to zero โโB
D. PEAP โโA and D
A. Acceptance
B. Avoidance
C. Mitigation
D. Transference โโB
A. Quantitative
B. Management
C. Technical
D. Physical โโD
A. TCP handshake
B. UDP handshake
C. Juggernaut
D. All of the above โโA
A. ARP requires validation.
B. ARP does not require validation.
C. ARP is connection oriented.
D. ARP is connectionless. โโB
A. Bastion host
B. Honeynet
C. Vulnerability system
D. Intrusion-detection system โโB
A. Application baselining
B. Patch management
C. Network monitoring
D. Input validation โโB
B. Voice encryption
C. Remote wipe
D. Passcode policy โโD
A. Sanitization
B. Declassification
C. Degaussing
D. Overwriting โโB
A. Full disk encryption
B. File-level encryption
C. Media-level encryption
D. Application-level encryption โโD
A. Bob's private key
B. Bob's public key
C. Val's private key
D. Val's public key โโC
A. Something you are
B. Something you do
C. Somewhere you are
D. Something you have โโD
C. Hashing algorithm
D. Certificate authority โโC
A. It uses a web of trust.
B. It uses a hierarchical structure.
C. It uses public key encryption.
D. It uses private key encryption. โโA and C
A. Certificate practice system (CPS)
B. Public key exchange (PKE)
C. Certificate practice statement (CPS)
D. Public key infrastructure (PKI) โโD
A. Bridge CA architecture
B. Sub-CA architecture
C. Single-CA architecture
D. Hierarchical CA architecture โโB
A. Mobile application management
B. Onboarding
C. Mobile device management
D. Device access controls โโB
C. Bridge
D. Linked โโB
A. Hotfix
B. Service packs
C. Patches
D. Coldfix โโA, B, and C
A. Public
B. Private
C. Hybrid
D. Community โโD
A. Performance of the algorithm worsens over time.
B. Keys generated by users start to repeat on other users' systems.
C. Hackers using distributed computing might be able to finally crack algorithms.
D. All options are correct. โโC
A. Difficult for management to understand
B. Less precise
C. Labor intensive
D. Time-consuming โโB
A. Content inspection