Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
Security+ Practice Test 5
Home
Security+ Practice Test 5
Start your Security+ Practice Test 5
Your organization has released a new mobile device policy. As per the policy, employees can either buy the mobile device or pay rental till the time they are employed with the organization. Which type of mobile device management is being practiced?
A. COPE
B. BYOD
C. CYOD
D. COBO
None
You are working on a customized module and encounter a bug that needs to be fixed immediately. However, you do not get proper response or patches from the relevant source. Which of the following may be the reason for this situation?
A. Lack of vendor support
B. Untrained user
C. Vulnerable business process
D. Weak implementation
None
You are deploying a wireless router. You want to ensure that even if someone shares the password for the wireless to a visitor, they should not be able to connect. What should you do to implement this?
A. Reduce the power range
B. Use strong encryption protocol
C. Disable SSID broadcasting
D. Enable MAC filtering
None
In a corporate environment, what would the best method to control the use of the mobile camera in certain areas?
A. Pushing an update to the mobile phones
B. Through a security policy
C. Manually disabling the camera on each phone
D. Disabling camera through MDM
None
You have recently installed a new wireless access point. To ensure its security, what is the first task that you must perform right after the installation?
A. Enable MAC filtering
B. Enable its firewall
C. Select a strong encryption protocol
D. Change the default admin password
None
An employee of your departmental store left their phone unattended. The customer they were attending was able to copy several phone numbers and browse personal photographs on the phone. How could this have been prevented?
A. Using hidden folders
B. Using screen lock
C. Using a boot password
D. Using device encryption
None
Which of the following attacks can be prevented by using multiple layers of firewall and by allowing only approved software to run?
A. Integer overflow
B. DLL injection
C. Zero-day
D. Buffer overflow
None
Which of the following is a widely used application of steganography?
A. Electronic commerce
B. Digital signatures
C. Digital watermarking
D. Disk encryption
None
In which phase of the Incident Response Plan are you likely to escalate an incident that you cannot resolve?
A. Investigation
B. Containment
C. Identification
D. Recovery
E. Eradication
None
You have recently joined an organization as an IT Manager. Your organization uses generic accounts for specific roles. The sales team executives have a generic account, SalesExec. Similar accounts exist in other departments. You decide to assign each user a user account with their name and discontinue the generic accounts. What is the purpose of creating individual accounts?
A. Organizational data privacy is at risk with generic accounts.
User data is likely to get corrupt with multiple users using a single account.
C. In case of an incident, you will be able to trace the responsible user.
D. Users must ensure the safety of the organization’s data.
None
Time's up