This free survey is powered by QUESTIONPRO.COM

Security+ Pre-Assessment


0%
Exit Survey »
 
 
Please take the time to complete the Security+ Pre-Assessment before your class begins.

Once you complete the pre-assessment you will be linked to the answer key.

If you have any questions please email [email protected]

 
 
 
1. Software or hardware device that allows only authorized network traffic in or out of a computer or network is called a:
 
A. firewall
 
B. packet sniffer
 
C. HoneyPot
 
D. anti-virus program
 
 
 
2. Which of the following access control models uses subject and object labels?
 
A. Mandatory Access Control (MAC)
 
B. Role Based Access Control (RBAC)
 
C. Rule Based Access Control (RBAC)
 
D. Discretionary Access Control (DAC)
 
 
 
3. Malicious code that enters a target system, lays dormant until a user opens the certain program then deletes the contents of attached network drives and removable storage devices is known as a:
 
A. worm
 
B. Trojan horse
 
C. logic bomb
 
D. honeypot
 
 
 
4. Which of the following types of authentication BEST describes providing a username, password and undergoing a thumb print scan to access a workstation?
 
A. Multifactor
 
B. Mutual
 
C. Biometric
 
D. Kerberos
 
 
 
5. Turnstiles, double entry doors and security guards are all prevention measures for which of the following types of social engineering?
 
A. Piggybacking
 
B. Looking over a co-workers shoulder to retrieve information
 
C. Looking through a co-worker's trash to retrieve information
 
D. Impersonation
 
 
 
6. For which reason are clocks used in Kerberos authentication?
 
A. Clocks are used to ensure proper connections.
 
B. Clocks are used to ensure that tickets expire correctly.
 
C. Clocks are used to generate the seed value for the encryptions keys.
 
D. Clocks are used to both benchmark and specify the optimal encryption algorithm.
 
 
 
7. Which of the following is a common type of attack on web servers?
 
A. Birthday
 
B. Buffer overflow
 
C. Spam
 
D. Brute force
 
 
 
8. Which of the following BEST describes the baseline process of securing devices on a network infrastructure?
 
A. Enumerating
 
B. Hardening
 
C. Active prevention
 
D. Passive detection
 
 
 
9. Which of the following describes backing up files and software that have changed since the last full or incremental backup?
 
A. Full backup
 
B. Differential backup
 
C. Incremental backup
 
D. Delta backup
 
 
 
10. Which of the following describes the validation of a message's origin?

 
A. Integrity
 
B. Confidentiality
 
C. Non-repudiation
 
D. Asymmetric encryption
 
 
 
11. Choose the statement that best details the difference between a worm and a Trojan horse?

 
A. Worms are distributed through e-mail messages while Trojan horses do not.
 
B. Worms self-replicate while Trojan horses do not.
 
C. Worms are a form of malicious code while Trojan horses are not.
 
D. There is no difference between a worm and a Trojan horse.
 
 
 
12. Choose the attack or malicious code that cannot be prevented or deterred solely through using technical measures.
 
A. Dictionary attacks.
 
B. Man in the middle attacks.
 
C. DoS (Denial of Service) attacks.
 
D. Social engineering.
 
 
 
13. A person must pass through a set of doors that enclose them in a specific area until properly authenticated. Which of the following terms BEST describes this scenario?

 
A. Hardware locks
 
B. Physical token system
 
C. Biometric access system
 
D. Mantrap
 
 
 
14. Which of the following is true about VPNs?

 
A. They provide antivirus protection.
 
B. Encapsulated packets are obfuscated.
 
C. They do not support symmetric encryption.
 
D. IP Packets are not encrypted.
 
 
 
15. Which of the following is an example of a social engineering attack?

 
A. Phishing
 
B. Smurf attack
 
C. Replay attack
 
D. ARP poisoning
 
 
 
16. Which of the following describes the role of a firewall?
 
A. Serves as a form of access control
 
B. Facilitates enumeration
 
C. Serves as a DMZ
 
D. Provides intrusion detection
 
 
 
17. Which of the following is often misused by spyware to collect and report a user's activities?

 
A. Persistent cookie
 
B. Web bug
 
C. Tracking cookie
 
D. Session cookie
 
 
 
18. An enclosure that prevents radio frequency signals from emanating out of a controlled environment is BEST described as which of the following?

 
A. Faraday cage
 
B. Mantrap
 
C. Grounded wiring frame
 
D. TEMPEST
 
 
 
19. Which of the following attacks are being referred to if the attack involves the attacker gaining access to a host in the network after a legitimate host/person has been authenticated?

 
A. TCP/IP Hijacking
 
B. UDP Attack
 
C. ICMP Attacks
 
D. Smurf Attacks
 
 
 
20. Which of the following terms BEST describes the process of stealing data from a Bluetooth enabled phone?

 
A. Data emanation
 
B. Smurfing
 
C. Bluesnarfing
 
D. Blue jacking
 
Survey Software Powered by QuestionPro Survey Software