Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [9]

By Root 3012 0
to jump to an early conclusion. Make sure you know exactly what each question is asking.

■ Don’t leave any unanswered questions. Unanswered questions are scored against you.

■ There will be questions with multiple correct responses. When there is more than one correct answer, a message at the bottom of the screen will prompt you to either “Choose two” or “Choose all that apply.” Be sure to read the messages displayed to know how many correct answers you must choose.

■ When answering multiple-choice questions you’re not sure about, use a process of elimination to get rid of the obviously incorrect answers first. Doing so will improve your odds if you need to make an educated guess.

■ On form-based tests (nonadaptive), because the hard questions will take the most time, save them for last. You can move forward and backward through the exam.

■ For the latest pricing on the exams and updates to the registration procedures, visit CompTIA’s website at www.comptia.org.

Assessment Test


1. Which type of audit can be used to determine whether accounts have been established properly and verify that privilege creep isn’t occurring?

a. Privilege audit

b. Usage audit

c. Escalation audit

d. Report audit

2. What kind of physical access device restricts access to a small number of individuals at one time?

a. Checkpoint

b. Perimeter security

c. Security zones

d. Mantrap

3. Which of the following is a set of voluntary standards governing encryption?

a. PKI

b. PKCS

c. ISA

d. SSL

4. Which protocol is used to create a secure environment in a wireless network?

a. WAP

b. WEP

c. WTLS

d. WML

5. An Internet server interfaces with TCP/IP at which layer of the DOD model?

a. Transport layer

b. Network layer

c. Process layer

d. Internet layer

6. You want to establish a network connection between two LANs using the Internet. Which technology would best accomplish that for you?

a. IPSec

b. L2TP

c. PPP

d. SLIP

7. Which design concept limits access to systems from outside users while protecting users and systems inside the LAN?

a. DMZ

b. VLAN

c. I&A

d. Router

8. In the key recovery process, which key must be recoverable?

a. Rollover key

b. Secret key

c. Previous key

d. Escrow key

9. Which kind of attack is designed to overload a particular protocol or service?

a. Spoofing

b. Back door

c. Man in the middle

d. Flood

10. Which component of an IDS collects data?

a. Data source

b. Sensor

c. Event

d. Analyzer

11. What is the process of making an operating system secure from attack called?

a. Hardening

b. Tuning

c. Sealing

d. Locking down

12. The integrity objective addresses which characteristic of information security?

a. Verification that information is accurate

b. Verification that ethics are properly maintained

c. Establishment of clear access control of data

d. Verification that data is kept private and secure

13. Which mechanism is used by PKI to allow immediate verification of a certificate’s validity?

a. CRL

b. MD5

c. SSHA

d. OCSP

14. Which of the following is the equivalent of a VLAN from a physical security perspective?

a. Perimeter security

b. Partitioning

c. Security zones

d. Physical barrier

15. A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was called account.doc. The system has been behaving unusually since he downloaded the file. What is the most likely event that occurred?

a. Your user inadvertently downloaded a virus using IM.

b. Your user may have a defective hard drive.

c. Your user is hallucinating and should increase his medication.

d. The system is suffering from power surges.

16. Which mechanism or process is used to enable or disable access to a network resource based on an IP address?

a. NDS

b. ACL

c. Hardening

d. Port blocking

Return Main Page Previous Page Next Page

®Online Book Reader