Search Header Logo

CompTIA Review #3

Authored by Jay Thapar

Computers

12th Grade

Used 2+ times

CompTIA Review #3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following would be the BEST way to provide a website login using existing credentials from a third-party site?

Federation

802.1X

PEAP

EAP-FAST

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A system administrator, Daniel, is working on a contract that will specify a minimum required uptime for a set of Internet-facing firewalls. Daniel needs to know how often the firewall hardware is expected to fail between repairs. Which of the following would BEST describe this information?

MTBF

RTO

MTTR

MTTF

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security administrator has been using EAP-FAST wireless authentication since the migration from WEP to WPA2. The company’s network team now needs to support additional authentication protocols inside of an encrypted tunnel. Which of the following would meet the network team’s requirements?

EAP-TLS

PEAP

EAP-TTLS

EAP-MSCHAPv2

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The embedded OS in a company’s time clock appliance is configured to reset the file system and reboot when a file system error occurs. On one of the time clocks, this file system error occurs during the startup process and causes the system to constantly reboot. Which of the following BEST describes this issue?

DLL injection

Resource Exhaustion

Race condition

Weak configuration

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A recent audit has found that existing password policies do not include any restrictions on password attempts, and users are not required to periodically change their passwords. Which of the following would correct these policy issues? (Select TWO)

Password Complexity

Password Expiration

Password Lockout

Password History

Password Recovery

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What kind of security control is associated with a login banner?

Preventive

Deterrent

Corrective

Physical

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security team has been provided with a non-credentialed vulnerability scan report created by a third-party. Which of the following would they expect to see on this report?

A summary of all files with invalid group assignments

A list of all unpatched operating system files

The version of web server software in use

A list of local user accounts

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?