CompTIA Sec+ Chapter 3, 2nd Attempt Missed

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

12th Grade

23 Qs

quiz-placeholder

Similar activities

CompTIA 220-902 Practice PM TEC

CompTIA 220-902 Practice PM TEC

11th - 12th Grade

26 Qs

Unit 11: Software and hardware security measures

Unit 11: Software and hardware security measures

12th Grade

20 Qs

037_Misconfiguration Vulnerabilities – CompTIA Security+

037_Misconfiguration Vulnerabilities – CompTIA Security+

9th Grade - University

25 Qs

NETESS 2.0 MODULE 19 QUIZ - Build a Small Cisco Network

NETESS 2.0 MODULE 19 QUIZ - Build a Small Cisco Network

12th Grade

20 Qs

Computer Networks Quizs

Computer Networks Quizs

9th - 12th Grade

20 Qs

98-367

98-367

10th Grade - Professional Development

21 Qs

Cyber EOP - Anti-Virus/Malware & Removal By Mr. B

Cyber EOP - Anti-Virus/Malware & Removal By Mr. B

12th Grade - University

18 Qs

Computer Security Measure

Computer Security Measure

11th Grade - University

19 Qs

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

Assessment

Quiz

Computers

12th Grade

Easy

Created by

blackpanther300 blackpanther300

Used 6+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Chris is preparing to implement an 802.1X-enabled wireless infrastructure. He knows that he wants to use an Extensible Authentication Protocol (EAP)-based protocol that does not require client-side certificates. Which of the following options should he choose?

EAP-MD5

PEAP

LEAP

EAP-TLS

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Mark is responsible for managing his company's load balancer and wants to use a load-balancing scheduling technique that will take into account the current server load and active sessions. Which of the following techniques should he choose?

Source IP hashing

Weighted response time

Least connection

Round robin

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which design concept limits access to systems from outside users while protecting users and systems inside the LAN?

DMZ

VLAN

Router

Guest network

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the equivalent of a VLAN from a physical security perspective?

Perimeter security

Partitioning

Security zones

Firewall

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of firewall examines the content and context of each packet it encounters?

Packet filtering firewall

Stateful packet filtering firewall

Application layer firewall

Gateway firewall

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You're designing a new network infrastructure so that your company can allow unauthenticated users connecting from the Internet to access certain areas. Your goal is to protect the internal network while providing access to those areas. You decide to put the web server on a separate subnet open to public contact. What is this subnet called?

Guest network

DMZ

Intranet

VLAN

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hans is a security administrator for a large company. Users on his network visit a wide range of websites. He is concerned they might get malware from one of these many websites. Which of the following would be his best approach to mitigate this threat?

Implement host-based antivirus.

Blacklist known infected sites.

Set browsers to allow only signed components.

Set browsers to block all active content (ActiveX, JavaScript, etc.).

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?