Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1.
2.
3.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
5.
6.
7.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
B. $220,000
C. $8,000
D. Less than $1000
Answer: D
ALO=SLE x (# of times this happens per year), so
ALO=$8000 x (1/15)=$535 or less than $1000.
8.
Chapter 2
9.
10.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
A. 10/100 Mode
B. Promiscuous Mode
C. Link Mode
D. Ethernet listening mode
Answer: B
Network cards on computers running sniffer software must be
set to Promiscuous mode in order to listen to all packets on
the network, not just those destined for it
11.
12.
13.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
Chapter 3
15.
16.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
18.
19.
20.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
B. Host-to-Host
C. Internet
D. Network Access
Answer: B
In the TCP/IP model, TCP functions at the Host-to-Host layer
21.
22.
23.
24.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
C. VPN
D. Telnet
Answer: C
The only technology listed that will allow you to connect two
networks over the Internet securely is the Virtual Private
Network, which connects two private networks together
securely
Chapter 4
25.
26.
27.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
C. DAC
D. CAC
Answer: A
The Role-Based Access Control (RBAC) model allows a user
to received privileges based on their position. For example, a
backup operator role would give anyone who occupied that
role the ability to perform backups, including the security
privileges that went along with it.
28.
29.
30.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
C. RADIUS
D. TACACS+
Answer: D
Although RADIUS performs in much the same manner,
TACACS+ is used almost exclusively by Cisco. Whereas
RADIUS is more of a generic standard used by many
different companies. TACACS+ is gaining ground, however.
31.
32.
33.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
B. Operational
C. Physical
D. Organizational
Answer: B
This kind of issue is particularly an operational security issue
because it is concerned with the ability of the operating
system to perform a specified function.
Chapter 5
34.
35.
36.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
D. Evil twin
Answer: D
An evil twin attack is one in which a rogue wireless access
point poses as a legitimate wireless service provider to
intercept information that users transmit.
Chapter 6
37.
38.
39.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
40.
41.
42.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
43.
Chapter 8
44.
45.
46.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
48.
49.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
C. DES
D. AES
Answer: A
The Secure Hash Algorithm creates a 160-bit hash algorithm.
50.
51.
52.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
53.
54.
55.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
56.
57.
58.
59.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
C. IEEE
D. WWW
Answer: C
The Institute for Electrical and Electronics Engineers is
primarily concerned with standards for both electrical and
electronic items (including some computer and
telecommunications equipment). Ethernet is an IEEE
standard.
60.
61.
62.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
64.
65.
66.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
C. RA
D. RSA
Answer: B
Public Key Infrastructure (PKI) contains four components:
Certificate Authority (CA), Registration Authority (RA),
RSA, and digital certificates.
Chapter 9
67.
68.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
69.
70.
71.
72.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
A. ring of trust
B. attack surface
C. public persona
D. personal space
Answer: B
The area of an application that is available to users (those
who are authenticated as well as those who are not) is known
as its attack surface.
Chapter 10
73.
74.
75.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
C. Biotangeric
D. Biogenic
Answer: B
Biometric security devices use the unique identifying
characteristics of the human body, like fingerprints & retina
patterns to uniquely identify a person for security
authentication.
76.
77.
78.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
Chapter 11
80.
81.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
82.
83.
84.
85.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
86.
87.
88.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
90.
91.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
93.
94.
95.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
B. MTTR
C. MTBF
D. MTAR
Answer: C
Mean Time Between Failures (MTBF) is the average length
of time a component will last, given average use. Usually,
this number is given in hours or days.
96.
97.
98.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.
information.
99.
100.
CompTIA Security+ Study Guide Instructor Materials Wiley 2014. All Rights Reserved.