Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
Security+ Practice Test 9
Home
Security+ Practice Test 9
Start your Security+ Practice Test 9
You have an e-commerce application that needs to be implemented. Implementing the application includes allowing access to external users on the Internet. You want to ensure the application is protected from cross-site scripting (XSS) and SQL injection. You also want to prevent OSI Layer 7 traffic. To meet the criteria in the scenario, which of the following should you implement along with the application?
A. Application Firewall
B. Network Intrusion Detection System (NIDS)
C. Network Firewall
D. URL filtering
None
Which of the following is a disadvantage of using a water-based system for fire suppression?
A. It operates in a sealed environment.
B. It is expensive and less reliable.
C. It reduces oxygen levels.
D. It causes damage to computers.
None
You need to connect two laptops using their wireless network adapter and share data between them. There is no network or wireless network available to connect both the laptops. You must perform this task with minimum administrative effort. What should you do?
A. Use MANET
B. Configure the Wi-Fi Direct
C. Use the Ad Hoc mode
D. Configure the Infrastructure mode
None
Which of the following is an example of the nonregulatory framework?
A. HIPAA
B. Basel III
C. FISMA
D. FedRAMP
E. PCI-DSS
None
You have recently implemented a media gateway that uses the Session Initiation Protocol (SIP) protocol. You want to ensure that the media gateway using SIP cannot be exploited via the man-in-the-middle (MITM) attacks. What should you do? [Choose all that apply.]
A. Secure the physical media
B. Limit number of concurrent sessions
C. Implement an authentication scheme
D. Update it with the latest patches
E. Implement data encryption
You log into your system using your password. A colleague is not able to log into your system with your account. Which authentication factor is this technique based on?
A. Something you are
B. Something you do
C. Something you have
D. Something you know
None
A crime scene technician in an organization collects all evidence from the moment a security incident had been discovered and documented the details of the events across their lifecycle. Which of the following process is performed by the forensic examiner here?
A. Legal hold
B. Chain of custody
C. System image capture
D. Data acquisition
None
When do you create an Object identifier (OID)?
A. When you release the certificate
B. When you create the certificate
C. When you receive an encrypted message
D. When you setup a certificate authority
None
An employee’s background screening reveals evidence of criminal activities. As an employer, what should be the next step?
A. Wait for the employee’s response
B. Take legal action
C. Issue written pre-adverse notification
D. Dismiss the employee
None
In a network configuration, where would you place the VPN concentrator?
A. Outside the network
B. Behind the firewall
C. In front of a firewall
D. Between 2 firewalls
None
Time's up