Security+ Free Practice Quiz
Quiz Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
An organization wants to encrypt e-mail messages while supporting both POP and IMAP. What is the best solution?
CorrectIncorrect -
Question 2 of 10
2. Question
You work in an office in Nebraska. You are asked to connect your office’s LAN with the LAN of a field office in Ohio. What is the best solution to establish this connection?
CorrectIncorrect -
Question 3 of 10
3. Question
A health insurance firm runs a customer service phone line for its customers to call to ask questions regarding their account. The firm does not want to reveal all of the information for each customer to the customer service representative, just enough information to verify their identity and handle basic requests. What protection method would be best in this instance?
CorrectIncorrect -
Question 4 of 10
4. Question
Your organization needs to store sales data but does not have enough storage space on its private cloud. So, the company decides to purchase cloud storage space using Amazon Web Services and connects the two storage systems together. What type of cloud deployment model does this describe?
CorrectIncorrect -
Question 5 of 10
5. Question
Your organization wants to completely separate physical security controls, like cameras and motion sensors, from the network so that these devices can never be accessed remotely. What tool can best accomplish this?
CorrectIncorrect -
Question 6 of 10
6. Question
Your organization’s system administrators all share a privileged account to configure a few of the seldom used network security devices. A security audit determines that one of the devices was misconfigured. How can you determine which system administrator misconfigured the device?
CorrectIncorrect -
Question 7 of 10
7. Question
Sheila drives to her company’s office building and uses her RFID badge to unlock the door to the building. She smiles to the security camera as she enters the elevator. When she arrives at her desk inserts her badge into a special slot in her laptop and enters a pin to authenticate. She then sends an e-mail to her security team telling them what a great job they did during the last patch upgrade. An audit trail could determine each of the following actions that Shiela took except:
CorrectIncorrect -
Question 8 of 10
8. Question
What is the best measurement for an organization to determine how often disruptions to business functions occur?
CorrectIncorrect -
Question 9 of 10
9. Question
This malware disguises itself by using regularly used protocols and ports and replicates a remote access connection.
CorrectIncorrect -
Question 10 of 10
10. Question
Which of these methods is the best way to prevent a replay attack?
CorrectIncorrect