100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CompTIA Security+ Study Questions for the Security+ Exam| 799 questions| with complete solutions| 133 Pages

Puntuación
-
Vendido
-
Páginas
133
Grado
A+
Subido en
06-03-2023
Escrito en
2022/2023

Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic? A. Connect the WAP to a different switch B. Create a voice VLAN C. Create a DMZ D. Set the switch ports to 802.1q mode correct answer: Answer: B Which of the following security tools can Jane, a security administrator, use to deter theft? A. Virtualization B. Cable locks C. GPS tracking D. Device encryption correct answer: Answer: B Which of the following can be implemented on a laptop hard drive to help prevent unauthorized access to data? A. Full disk encryption B. Key escrow C. Screen lock D. Data loss prevention correct answer: Answer: A Which of the following network devices allows Jane, a security technician, to perform malware inspection? A. Load balancer B. VPN concentrator C. Firewall D. NIPS correct answer: Answer: D Which of the following is a valid server-role in a Kerberos authentication system? A. Token issuing system B. Security assertion server C. Authentication agent D. Ticket granting server correct answer: Answer: D The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. Jane, an administrative assistant, needs access to view one document in network share A to gather data for management reports. Which of the following gives accounting and Jane the correct rights to these areas? A. Accounting should be given read/write access to network share A and read access to network share B. Jane should be given read access for the specific document on network share A. B. Accounting should be given read/write access to network share A and read access to network share B. Jane should be given read access to network share A. C. Accounting should be given full access to network share A and read access to network share B. Jane should be given read/write access for the specific document on network share A. D. Accounting should be given full access to network share A and read access to network share B. Jane should be given read/write access to network share A. correct answer: Answer: A Which of the following creates ciphertext by changing the placement of characters? A. Transposition cryptography B. Hashing C. Elliptical cryptography D. Digital signatures correct answer: Answer: A Which of the following malware types uses stealth techniques to conceal itself, cannot install itself without user interaction, and cannot automatically propagate? A. Rootkit B. Logic bomb C. Adware D. Virus correct answer: Answer: A When Pete, an employee, leaves a company, which of the following should be updated to ensure Pete's security access is reduced or eliminated? A. RSA B. CA C. PKI D. CRL correct answer: Answer: D Which of the following should Matt, an administrator, change FIRST when installing a new access point? A. SSID broadcast B. Encryption C. DHCP addresses D. Default password correct answer: Answer: D A datacenter has two rows of racks which are facing the same direction. Sara, a consultant, recommends the racks be faced away from each other. This is an example of which of the following environmental concepts? A. Fire suppression B. Raised floor implementation C. Hot and cool aisles D. Humidity controls implementation correct answer: Answer: C Which of the following password policies is the MOST effective against a brute force network attack? A. Password complexity B. Password recovery C. 30 day password expiration D. Account lockout correct answer: Answer: D Which of the following would BEST be used by Sara, the security administrator, to calculate the likelihood of an event occurring? A. SLE B. ALE C. ROI D. ARO correct answer: Answer: D Which of the following should Matt, an administrator, implement in a server room to help prevent static electricity? A. GFI electrical outlets B. Humidity controls C. ESD straps D. EMI shielding correct answer: Answer: B Sara, a company's security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building Sara should immediately implement which of the following? A. Acceptable Use Policy B. Physical security controls C. Technical controls D. Security awareness training correct answer: Answer: D Pete, an IT security technician, has been tasked with implementing physical security controls for his company's workstations. Which of the following BEST meets this need? A. Host-based firewalls B. Safe C. Cable locks D.

Mostrar más Leer menos











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Información del documento

Subido en
6 de marzo de 2023
Número de páginas
133
Escrito en
2022/2023
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$15.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Classroom NURSING
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
4699
Miembro desde
3 año
Número de seguidores
3218
Documentos
52101
Última venta
16 horas hace
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Lee mas Leer menos
4.0

1163 reseñas

5
613
4
213
3
190
2
39
1
108

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes