Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
Security+ Practice Test 4
Home
Security+ Practice Test 4
Start your Security+ Practice Test 4
In your organization, each employee carries an identity card, which is used to enter the premises as well as access information from the network. The employee badges are configured with a private key along with their personal information, and it acts as a smart card. Which type of security control is the smart card?
A. Detective
B. Preventive
C. Corrective
D. Recovery
None
A user downloads a file from the Internet. When the user attempts to open the file, the download asks to allow the installation of an add-in to view the file type. Which of the following is likely to be installed on the system after this?
A. Adware
B. Logic bomb
C. Rootkit
D. Spyware
None
You need to implement a wireless network that is in the most secure form. You also want to integrate digital certificates in this implementation. What should you do?
A. Implement the wireless network in the pre-shared key mode
B. Implement the wireless network in the pre-shared key mode with a RADIUS server
C. Implement the wireless network in the open mode
D. Implement the wireless network in the enterprise mode
None
You have joined as an IT Manager in a newly incorporated insurance firm. Your firm has setup a large datacenter with hundreds of servers and a team to manage it. You have been asked to deploy an insurance application. The application will store customer-sensitive data and needs to be installed in an environment that is under your control. What type of deployment should you opt for?
A. Managed hosting
B. Public Cloud
C. Third-party hosting
D. On-premises
None
An organization takes extra care to hide the cryptographic methods that it uses. Which of the following term describes this secrecy?
A. Cipher Block Chaining
B. Electronic Code Book
C. Security through obsecurity
D. Perfect forward secrecy
None
The Sales team in your organization is provided with mobile phones. Some of the Sales team members have installed customized themes using sideloading. You want to prevent this from happening. What should you do?
A. Configure each phone with guest access to the Sales team
B. Use MDM to manage their devices
C. Install the Android Device Manager on each phone
D. There is no foolproof method to prevent side loading
None
Which is the first stage of deployment in which you create the design of the solution?
A. Staging
B. Test
C. Production
D. Development
None
Which of the following receives the traffic from the sensors on a network?
A. Filter
B. Proxy
C. Collector
D. Correlation Engine
None
Your junior developer has developed a module in an application. When you test the module, you notice that the memory and CPU usage in the system has increased. Which of the following is likely to cause this issue?
A. Field validation
B. Client-side execution
C. Code reusability
D. Dead code
None
A developer wants to send an ActiveX component over a private network. Which of the following certificates does the developer choose to ensure that the software component does not get tampered or corrupted during the transit?
A. Code signing certificates
B. User certificates
C. Machine/computer certificates
D. Domain validation certificates
None
Time's up