100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Security+ DCOM 258 Exam Questions and Answers Latest Update

Beoordeling
-
Verkocht
-
Pagina's
9
Cijfer
A+
Geüpload op
03-11-2025
Geschreven in
2025/2026

Security+ DCOM 258 Exam Questions and Answers Latest Update Encryption, authentication, and anti-malware are all ways to protect against malicious threats. - Answers True An example of authorization with "something you are" would be? - Answers Retina Pattern By an overwhelming percentage, most security / data breaches are caused by: - Answers Human Error/Negligence All are types of physical security except: - Answers Concrete Barriers Which of the following does the "A" in "CIA" stand for when relating to IT security? - Answers Availability Social engineering includes viruses, worms, and Trojan horses. - Answers False Which type of hacker has no affiliation with an organization yet will hack systems without malicious intent, but yet may be doing something illegal? - Answers Gray Hat When a network security device experiences a system failure, it is best for it to default to a "Fail / Open" state. - Answers False For information security, what is the I in CIA? - Answers Integrity Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails? - Answers Nonrepudiation Which of the following is the greatest risk for removable storage? - Answers Confidentiality of Data In information security the three main goals are known as Confidentiality, Integrity, and Availability. - Answers True Which is not a type of Social Engineering? - Answers Trojan Which of the following is an example of a personal software firewall? - Answers ZoneAlarm Which of the following methods of malware delivery is used in computer programs to bypass normal authentication? - Answers Backdoor One of the biggest problems with BYOD is - Answers There is virtually no security control over the sofware / hardware. Which of the following occurs when an IDS identifies legitimate activity as something malicious? - Answers False-Positive Opening mail relays can decrease the amount of spam that an organization receives on its e-mail server. - Answers False Which of the following is an example of whole disk encryption? - Answers Bitlocker A master computer controls a botnet. - Answers True Most antimalware / virus software is signature based. - Answers True A RAT is an example of a Trojan horse. - Answers True Malware is software designed to infiltrate a computer system without the users consent. - Answers True Active interception is the act of exploiting a bug or design flaw in software. - Answers False Viruses self-replicate whereas worms do not. - Answers False The love bug is an example of a rootkit. - Answers False Which command lists the hotfixes installed to Windows? - Answers systeminfo What is baselining? - Answers The process of measuring changes in networking devices, hardware, and software. Of the following, which can be a security benefit when using virtualization? - Answers If a virtual machine is compromised, the adverse effects can be compartmentalized. The second step in a patch management strategy is testing. - Answers True Which of the following should you implement to keep a well-maintained computer? - Answers Update the firewall.

Meer zien Lees minder
Instelling
DCOM 258
Vak
DCOM 258

Voorbeeld van de inhoud

Security+ DCOM 258 Exam Questions and Answers Latest Update 2025-2026

Encryption, authentication, and anti-malware are all ways to protect against malicious threats. -
Answers True

An example of authorization with "something you are" would be? - Answers Retina Pattern

By an overwhelming percentage, most security / data breaches are caused by: - Answers
Human Error/Negligence

All are types of physical security except: - Answers Concrete Barriers

Which of the following does the "A" in "CIA" stand for when relating to IT security? - Answers
Availability

Social engineering includes viruses, worms, and Trojan horses. - Answers False

Which type of hacker has no affiliation with an organization yet will hack systems without
malicious intent, but yet may be doing something illegal? - Answers Gray Hat

When a network security device experiences a system failure, it is best for it to default to a "Fail
/ Open" state. - Answers False

For information security, what is the I in CIA? - Answers Integrity

Tom sends out many e-mails containing secure information to other companies. What concept
should be implemented to prove that Tom did indeed send the e-mails? - Answers
Nonrepudiation

Which of the following is the greatest risk for removable storage? - Answers Confidentiality of
Data

In information security the three main goals are known as Confidentiality, Integrity, and
Availability. - Answers True

Which is not a type of Social Engineering? - Answers Trojan

Which of the following is an example of a personal software firewall? - Answers ZoneAlarm

Which of the following methods of malware delivery is used in computer programs to bypass
normal authentication? - Answers Backdoor

One of the biggest problems with BYOD is - Answers There is virtually no security control over
the sofware / hardware.

Which of the following occurs when an IDS identifies legitimate activity as something malicious?
- Answers False-Positive

, Opening mail relays can decrease the amount of spam that an organization receives on its e-
mail server. - Answers False

Which of the following is an example of whole disk encryption? - Answers Bitlocker

A master computer controls a botnet. - Answers True

Most antimalware / virus software is signature based. - Answers True

A RAT is an example of a Trojan horse. - Answers True

Malware is software designed to infiltrate a computer system without the users consent. -
Answers True

Active interception is the act of exploiting a bug or design flaw in software. - Answers False

Viruses self-replicate whereas worms do not. - Answers False

The love bug is an example of a rootkit. - Answers False

Which command lists the hotfixes installed to Windows? - Answers systeminfo

What is baselining? - Answers The process of measuring changes in networking devices,
hardware, and software.

Of the following, which can be a security benefit when using virtualization? - Answers If a virtual
machine is compromised, the adverse effects can be compartmentalized.

The second step in a patch management strategy is testing. - Answers True

Which of the following should you implement to keep a well-maintained computer? - Answers
Update the firewall.

Update the BIOS.

Use a surge protector.

Which of the following is the best file system to use in Windows? - Answers NTFS

To open the Local Group Policy Editor console window, a user should type MMC in the Run
prompt. - Answers False

The net stop commands disable services in Windows. - Answers False

Which of the following are virtualization software types? - Answers Microsoft Virtual PC

Microsoft Virtual Server

VMware

Geschreven voor

Instelling
DCOM 258
Vak
DCOM 258

Documentinformatie

Geüpload op
3 november 2025
Aantal pagina's
9
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TutorJosh Chamberlain College Of Nursing
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
371
Lid sinds
1 jaar
Aantal volgers
16
Documenten
29888
Laatst verkocht
2 dagen geleden
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

59 beoordelingen

5
21
4
15
3
12
2
0
1
11

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen