100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Security+ DCOM 258 Exam Questions and Answers Latest Update

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
03-11-2025
Written in
2025/2026

Security+ DCOM 258 Exam Questions and Answers Latest Update Encryption, authentication, and anti-malware are all ways to protect against malicious threats. - Answers True An example of authorization with "something you are" would be? - Answers Retina Pattern By an overwhelming percentage, most security / data breaches are caused by: - Answers Human Error/Negligence All are types of physical security except: - Answers Concrete Barriers Which of the following does the "A" in "CIA" stand for when relating to IT security? - Answers Availability Social engineering includes viruses, worms, and Trojan horses. - Answers False Which type of hacker has no affiliation with an organization yet will hack systems without malicious intent, but yet may be doing something illegal? - Answers Gray Hat When a network security device experiences a system failure, it is best for it to default to a "Fail / Open" state. - Answers False For information security, what is the I in CIA? - Answers Integrity Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails? - Answers Nonrepudiation Which of the following is the greatest risk for removable storage? - Answers Confidentiality of Data In information security the three main goals are known as Confidentiality, Integrity, and Availability. - Answers True Which is not a type of Social Engineering? - Answers Trojan Which of the following is an example of a personal software firewall? - Answers ZoneAlarm Which of the following methods of malware delivery is used in computer programs to bypass normal authentication? - Answers Backdoor One of the biggest problems with BYOD is - Answers There is virtually no security control over the sofware / hardware. Which of the following occurs when an IDS identifies legitimate activity as something malicious? - Answers False-Positive Opening mail relays can decrease the amount of spam that an organization receives on its e-mail server. - Answers False Which of the following is an example of whole disk encryption? - Answers Bitlocker A master computer controls a botnet. - Answers True Most antimalware / virus software is signature based. - Answers True A RAT is an example of a Trojan horse. - Answers True Malware is software designed to infiltrate a computer system without the users consent. - Answers True Active interception is the act of exploiting a bug or design flaw in software. - Answers False Viruses self-replicate whereas worms do not. - Answers False The love bug is an example of a rootkit. - Answers False Which command lists the hotfixes installed to Windows? - Answers systeminfo What is baselining? - Answers The process of measuring changes in networking devices, hardware, and software. Of the following, which can be a security benefit when using virtualization? - Answers If a virtual machine is compromised, the adverse effects can be compartmentalized. The second step in a patch management strategy is testing. - Answers True Which of the following should you implement to keep a well-maintained computer? - Answers Update the firewall.

Show more Read less
Institution
DCOM 258
Course
DCOM 258

Content preview

Security+ DCOM 258 Exam Questions and Answers Latest Update 2025-2026

Encryption, authentication, and anti-malware are all ways to protect against malicious threats. -
Answers True

An example of authorization with "something you are" would be? - Answers Retina Pattern

By an overwhelming percentage, most security / data breaches are caused by: - Answers
Human Error/Negligence

All are types of physical security except: - Answers Concrete Barriers

Which of the following does the "A" in "CIA" stand for when relating to IT security? - Answers
Availability

Social engineering includes viruses, worms, and Trojan horses. - Answers False

Which type of hacker has no affiliation with an organization yet will hack systems without
malicious intent, but yet may be doing something illegal? - Answers Gray Hat

When a network security device experiences a system failure, it is best for it to default to a "Fail
/ Open" state. - Answers False

For information security, what is the I in CIA? - Answers Integrity

Tom sends out many e-mails containing secure information to other companies. What concept
should be implemented to prove that Tom did indeed send the e-mails? - Answers
Nonrepudiation

Which of the following is the greatest risk for removable storage? - Answers Confidentiality of
Data

In information security the three main goals are known as Confidentiality, Integrity, and
Availability. - Answers True

Which is not a type of Social Engineering? - Answers Trojan

Which of the following is an example of a personal software firewall? - Answers ZoneAlarm

Which of the following methods of malware delivery is used in computer programs to bypass
normal authentication? - Answers Backdoor

One of the biggest problems with BYOD is - Answers There is virtually no security control over
the sofware / hardware.

Which of the following occurs when an IDS identifies legitimate activity as something malicious?
- Answers False-Positive

, Opening mail relays can decrease the amount of spam that an organization receives on its e-
mail server. - Answers False

Which of the following is an example of whole disk encryption? - Answers Bitlocker

A master computer controls a botnet. - Answers True

Most antimalware / virus software is signature based. - Answers True

A RAT is an example of a Trojan horse. - Answers True

Malware is software designed to infiltrate a computer system without the users consent. -
Answers True

Active interception is the act of exploiting a bug or design flaw in software. - Answers False

Viruses self-replicate whereas worms do not. - Answers False

The love bug is an example of a rootkit. - Answers False

Which command lists the hotfixes installed to Windows? - Answers systeminfo

What is baselining? - Answers The process of measuring changes in networking devices,
hardware, and software.

Of the following, which can be a security benefit when using virtualization? - Answers If a virtual
machine is compromised, the adverse effects can be compartmentalized.

The second step in a patch management strategy is testing. - Answers True

Which of the following should you implement to keep a well-maintained computer? - Answers
Update the firewall.

Update the BIOS.

Use a surge protector.

Which of the following is the best file system to use in Windows? - Answers NTFS

To open the Local Group Policy Editor console window, a user should type MMC in the Run
prompt. - Answers False

The net stop commands disable services in Windows. - Answers False

Which of the following are virtualization software types? - Answers Microsoft Virtual PC

Microsoft Virtual Server

VMware

Written for

Institution
DCOM 258
Course
DCOM 258

Document information

Uploaded on
November 3, 2025
Number of pages
9
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
371
Member since
1 year
Number of followers
16
Documents
29888
Last sold
1 day ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

59 reviews

5
21
4
15
3
12
2
0
1
11

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions