Search Header Logo

COMP TIA SECURITY EXAM PART 1 OF 2

Authored by Sahil Jamsa

Instructional Technology

11th Grade

Used 2+ times

COMP TIA SECURITY EXAM PART 1 OF 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A remote access user needs to gain access to resources on the server. Which of the following processes are performed by the remote access server to control access to resources?

Authentication and accounting

Authorization and accounting

Identity proofing and authentication

Authentication and authorization

Identity proofing and authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sometimes, an attacker's goal is to prevent access to a system rather than to gain access. This form of attack is often called a denial-of-service attack and causes which impact?

Identity Theft

Data Exfiltration

Availability Loss

Data Loss

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of RFID tag can send a signal over a long distance?

NFC

Active

Bluetooth

Passive

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used as a secure tunnel to connect two networks?

VLAN

VAN

VPN

VFA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following strategies can protect against a rainbow table password attack?

Add random bits to the password before hashing takes place

Enforce strict password restrictions

Encrypt the password file with one-way encryption

Educate users to resist social engineering attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of your users, Karen Scott, has recently married and is now Karen Jones. She has requested that her username be changed from kscott to kjones with no other values changed. Which of the following commands would accomplish this?

usermod -u kjones kscott

usermod -l kjones kscott

usermod -l kscott kjones

usermod -u kscott kjones

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)

Group Policy

Security Templates

Security Configuration and Analysis

WSUS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology