Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Computing Technology Industry Association (CompTIA)
Exam 15: CompTIA Security+
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 821
Multiple Choice
A systems administrator has been assigned to create accounts for summer interns. The interns are only authorized to be in the facility and operate computers under close supervision. They must also leave the facility at designated times each day. However, the interns can access intern file folders without supervision. Which of the following represents the BEST way to configure the accounts? (Choose two.)
Question 822
Multiple Choice
A security auditor is performing a vulnerability scan to find out if mobile applications used in the organization are secure. The auditor discovers that one application has been accessed remotely with no legitimate account credentials. After investigating, it seems the application has allowed some users to bypass authentication of that application. Which of the following types of malware allow such a compromise to take place? (Choose two.)
Question 823
Multiple Choice
Which of the following is used to encrypt web application data?
Question 824
Multiple Choice
Which of the following are considered to be "something you do"? (Choose two.)
Question 825
Multiple Choice
A security engineer wants to add SSL to the public web server. Which of the following would be the FIRST step to implement the SSL certificate?
Question 826
Multiple Choice
A network administrator is creating a new network for an office. For security purposes, each department should have its resources isolated from every other department but be able to communicate back to central servers. Which of the following architecture concepts would BEST accomplish this?
Question 827
Multiple Choice
Ann, a security analyst, wants to implement a secure exchange of email. Which of the following is the BEST option for Ann to implement?
Question 828
Multiple Choice
A security administrator has replaced the firewall and notices a number of dropped connections. After looking at the data the security administrator sees the following information that was flagged as a possible issue:
Which of the following can the security administrator determine from this?
Question 829
Multiple Choice
Which of the following development models entails several iterative and incremental software development methodologies such as Scrum?
Question 830
Multiple Choice
An incident response analyst at a large corporation is reviewing proxy log data. The analyst believes a malware infection may have occurred. Upon further review, the analyst determines the computer responsible for the suspicious network traffic is used by the Chief Executive Officer (CEO) . Which of the following is the best NEXT step for the analyst to take?
Question 831
Multiple Choice
A company wants to provide centralized authentication for its wireless system. The wireless authentication system must integrate with the directory back end. Which of the following is a AAA solution that will provide the required wireless authentication?
Question 832
Multiple Choice
A company needs to implement a system that only lets a visitor use the company's network infrastructure if the visitor accepts the AUP. Which of the following should the company use?
Question 833
Multiple Choice
Which of the following uses tokens between the identity provider and the service provider to authenticate and authorize users to resources?
Question 834
Multiple Choice
Which of the following are used to substantially increase the computation time required to crack a password? (Choose two.)
Question 835
Multiple Choice
A security administrator is reviewing the following firewall configuration after receiving reports that users are unable to connect to remote websites:
Which of the following is the MOST secure solution the security administrator can implement to fix this issue?
Question 836
Multiple Choice
Which of the following penetration testing concepts is an attacker MOST interested in when placing the path of a malicious file in the Windows/CurrentVersion/Run registry key?
Question 837
Multiple Choice
A security analyst is specifying requirements for a wireless network. The analyst must explain the security features provided by various architecture choices. Which of the following is provided by PEAP, EAP-TLS, and EAP-TTLS?