|
Please take the time to complete the Security+ Pre-Assessment before your class begins.
Once you complete the pre-assessment you will be linked to the answer key.
If you have any questions please email [email protected]
|
| |
|
|
|
1. Software or hardware device that allows only authorized network traffic in or out of a computer or network is called a: |
| |
|
|
|
|
2. Which of the following access control models uses subject and object labels? |
| |
|
|
|
|
3. Malicious code that enters a target system, lays dormant until a user opens the certain program then deletes the contents of attached network drives and removable storage devices is known as a: |
| |
|
|
|
|
4. Which of the following types of authentication BEST describes providing a username, password and undergoing a thumb print scan to access a workstation? |
| |
|
|
|
|
5. Turnstiles, double entry doors and security guards are all prevention measures for which of the following types of social engineering? |
| |
|
|
|
|
6. For which reason are clocks used in Kerberos authentication? |
| |
|
|
|
|
7. Which of the following is a common type of attack on web servers? |
| |
|
|
|
|
8. Which of the following BEST describes the baseline process of securing devices on a network infrastructure? |
| |
|
|
|
|
9. Which of the following describes backing up files and software that have changed since the last full or incremental backup? |
| |
|
|
|
|
10. Which of the following describes the validation of a message's origin?
|
| |
|
|
|
|
11. Choose the statement that best details the difference between a worm and a Trojan horse?
|
| |
|
|
|
|
12. Choose the attack or malicious code that cannot be prevented or deterred solely through using technical measures.
|
| |
|
|
|
|
13. A person must pass through a set of doors that enclose them in a specific area until properly authenticated. Which of the following terms BEST describes this scenario?
|
| |
|
|
|
|
14. Which of the following is true about VPNs?
|
| |
|
|
|
|
15. Which of the following is an example of a social engineering attack?
|
| |
|
|
|
|
16. Which of the following describes the role of a firewall? |
| |
|
|
|
|
17. Which of the following is often misused by spyware to collect and report a user's activities?
|
| |
|
|
|
|
18. An enclosure that prevents radio frequency signals from emanating out of a controlled environment is BEST described as which of the following?
|
| |
|
|
|
|
19. Which of the following attacks are being referred to if the attack involves the attacker gaining access to a host in the network after a legitimate host/person has been authenticated?
|
| |
|
|
|
|
20. Which of the following terms BEST describes the process of stealing data from a Bluetooth enabled phone?
|
| |
|
|
|