Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
Security+ Practice Test 6
Home
Security+ Practice Test 6
Start your Security+ Practice Test 6
An unauthorized user attempted to authenticate himself with the fingerprint scanner and got authenticated. Which of the following has just occurred?
A. False rejection rate
B. False acceptance rate
C. True acceptance rate
D. Crossover rate
None
The users in your organization use a thin client to connect to their respective desktop environments. The users can use the desktop environment from their laptops and mobile phones. What has been configured for the users?
A. HTTPS
B. SSH
C. Telnet
D. VDI
None
You have a Linux system that is connected to the network. The system has multiple network adapters with manually configured IP Addresses. You want to verify the IP addresses on all of its network adapters. What should you do?
A. Use the ifconfig command with -a parameter
B. Use the ipconfig command with all parameters
C. Use the netstat command with the -a parameter
D. Use the arp command with -a parameter
None
You have developed an application. When you execute the application for testing, the system hangs. After you restart the system, it works in the normal fashion. Once again, when you execute the application, the system again hangs. What could be the possible cause?
A. Buffer overflow
B. Improper input validation
C. CPU lockdown
D. Memory leak
None
A user is using a cryptographic cipher that encodes ‘BAD’ as ‘ONQ.’ Which of the following methods is used by the user here?
A. ROT13
B. XOR
C. PBKDF2
D. BCRYPT
None
Which of the following feature of a digital camera, if available, can be exploited by a hacker?
A. Storage
B. Wireless Connectivity
C. CPU
D. Memory
None
During a security audit, you notice that several revoked certificates are being used on the network. You need to prevent this from happening in the future. What should you do?
A. Update and publish CRL
B. Manually update the certificate
C. Ask the users to request for renewed certificates
D. Extend the certificate date
None
Which of the following physical controls helps prevent tailgating and may snare the intruder who is trying to tailgate?
A. Mantrap
B. Surveillance devices
C. Motion sensors
D. Intrusion Prevention System
None
Which of the following parameters are exploited during a cryptographic birthday attack?
A. Space-time trade-off
B. Cryptographic hash function
C. Collision in the hashing algorithm
D. Correlation between a text and cipher text
None
Your organization has recently collaborated with another organization. Your organization needs to share and receive large files over the Internet with this organization. You have been mandated to configure a secure method. Which of the following should you configure?
A. HTTP
B. SSH
C. FTP
D. FTPS
None
Time's up