CompTIA Security+ Practice Test 1 SY0-401

CompTIA Security+ Practice Test 1 SY0-401


Which of the following should be used when a business needs a block cipher with minimal key size for internal encryption?

 

 

 

 

Which of the following is a security reason to implement virtualization in your network?

 

 

 

 

Which of the following best describes the difference between a cipher lock and a wireless lock?

 

 

 

 

Which of the following best practices makes a wireless network more difficult to find?

 

 

 

 

When an employee discovers someone wandering around a secured area without a badge or escort, which user-awareness training topic should provide them with the proper response?

 

 

 

 

Which of the following describes an LDAP injection attack?

 

 

 

 

A systems administrator is tasked with auditing user privileges. Which of the following steps must be taken? (Select two correct answers.)

 

 

 

 

The policy preventing too much power leading to corruption is called the __________________ policy.

 

 

 

 

An administrator wants to reduce the size of the attack surface of Windows server 2008. Which of the following is the best answer to accomplish this?

 

 

 

 

Antivirus software preserves which two elements of data security?

 

 

 

 


Question 1 of 10

More Tests