Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
Security+ Practice Test 1
Home
Security+ Practice Test 1
Start your Security+ Practice Test 1
A consultant is calling the help desk as a CIO to obtain the password of an employee. What kind of principle of social engineering is performed here?
A. Urgency
B. Familiarity
C. Intimidation
D. Authority
None
You have been facing an Internet connectivity issue with one of the systems on the network. The system obtains an IP address from the internal DHCP server. You ping the loopback address, 127.0.0.1, and the local computer’s IP address and get a successful response. However, you are not able to get a response to the ping command from Google.com or Yahoo.com. You need to resolve this issue. What should you do?
A. Release and renew the IP address
B. Restart the system
C. Restart the DNS client
D. Clear the ARP cache
None
A hypothetical classic hash algorithm is supplied with an input value ‘P’. A hash value, for example, 543367 is generated for the given input ‘P’. An attacker supplies a different input value ‘Q’ to the same hash algorithm. The hash value for input ‘Q’ is also generated as 543367. Which of the following processes does the hash algorithm demonstrate?
A. Diffusion
B. Collision
C. Confusion
D. Encryption
None
Which of the following attack is the wireless LAN equivalent of the phishing attack?
A. Replay
B. Evil twin
C. Bluesnarfing
D. Jamming
None
Which of the following are examples of pulverizing? [Choose all that apply.]
A. Hammering a drive
B. Drill holes into a drive
C. Turn a drive into scrap
D. Shooting a drive
One of the employees of PLAB Inc. had brought a personal laptop and connected it to the network. The personal laptop was infected with a worm that could replicate itself on the network. Even though the security administrator could control the situation, but he does not want this incident to be repeated. The security administrator wants to allow only the authorized endpoints to be connected to the network ports. Which of the following needs to be implemented to meet this goal?
A. Network Segmentation
B. 802.1x
C. Intrusion Prevention System (IPS)
D. Intrusion Detection System (IDS)
E. MAC Filtering
None
You have two large physical local area networks (LANs). You need to combine both of them into a single logical LAN. What should you do?
A. You need to install a router in between both the physical LANs
B. It is not possible to combine physical LANs into a single logical LAN.
C. You need to install a bridge between both the physical LANs.
D. You can use a Layer 3 switch to configure the route between the two LANs.
None
When exposing a Web service, you get the following errors: The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel What could be the probable cause? [Choose all that apply.]
A. The certificate name is not included in the CRL.
B. The certificate is self-signed.
C. The hostname used in the URL doesn't match the name on the certificate.
D. The certificate has expired.
E. There is a connectivity issue.
F. The Certificate Root Authority that issued the certificate is not trusted by the server.
You have been asked to deploy multiple applications in the AWS cloud. These applications would be catering to internal employees. Which type of cloud deployment model is being used in this scenario?
A. Hybrid
B. Public
C. Private
D. Community
None
An employee of an online store has been entrusted with the task of determining the trends in the customer buying habits and the statistics of the sales regarding products and demographics. Which of the following type of group should this employee be a part of?
A. Data owner
B. Data user
C. Privileged user
D. System Administrator
None
Time's up