
COMP TIA SECURITY EXAM PART 1 OF 2
Authored by Sahil Jamsa
Instructional Technology
11th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A remote access user needs to gain access to resources on the server. Which of the following processes are performed by the remote access server to control access to resources?
Authentication and accounting
Authorization and accounting
Identity proofing and authentication
Authentication and authorization
Identity proofing and authorization
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sometimes, an attacker's goal is to prevent access to a system rather than to gain access. This form of attack is often called a denial-of-service attack and causes which impact?
Identity Theft
Data Exfiltration
Availability Loss
Data Loss
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of RFID tag can send a signal over a long distance?
NFC
Active
Bluetooth
Passive
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is used as a secure tunnel to connect two networks?
VLAN
VAN
VPN
VFA
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following strategies can protect against a rainbow table password attack?
Add random bits to the password before hashing takes place
Enforce strict password restrictions
Encrypt the password file with one-way encryption
Educate users to resist social engineering attacks
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
One of your users, Karen Scott, has recently married and is now Karen Jones. She has requested that her username be changed from kscott to kjones with no other values changed. Which of the following commands would accomplish this?
usermod -u kjones kscott
usermod -l kjones kscott
usermod -l kscott kjones
usermod -u kscott kjones
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)
Group Policy
Security Templates
Security Configuration and Analysis
WSUS
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?