Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Computing Technology Industry Association (CompTIA)
Exam 15: CompTIA Security+
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 801
Multiple Choice
A security auditor is testing perimeter security in a building that is protected by badge readers. Which of the following types of attacks would MOST likely gain access?
Question 802
Multiple Choice
Which of the following methods minimizes the system interaction when gathering information to conduct a vulnerability assessment of a router?
Question 803
Multiple Choice
A bank is experiencing a DoS attack against an application designed to handle 500 IP-based sessions. in addition, the perimeter router can only handle 1Gbps of traffic. Which of the following should be implemented to prevent a DoS attacks in the future?
Question 804
Multiple Choice
When sending messages using symmetric encryption, which of the following must happen FIRST?
Question 805
Multiple Choice
A bank uses a wireless network to transmit credit card purchases to a billing system. Which of the following would be MOST appropriate to protect credit card information from being accessed by unauthorized individuals outside of the premises?
Question 806
Multiple Choice
Which of the following authentication concepts is a gait analysis MOST closely associated?
Question 807
Multiple Choice
A security administrator suspects that a DDoS attack is affecting the DNS server. The administrator accesses a workstation with the hostname of workstation01 on the network and obtains the following output from the ipconfig command:
The administrator successfully pings the DNS server from the workstation. Which of the following commands should be issued from the workstation to verify the DDoS attack is no longer occuring?
Question 808
Multiple Choice
An external attacker can modify the ARP cache of an internal computer. Which of the following types of attacks is described?
Question 809
Multiple Choice
A group of developers is collaborating to write software for a company. The developers need to work in subgroups and control who has access to their modules. Which of the following access control methods is considered user-centric?