Home » CompTIA Security+ mcq questions with answer – Set 4

CompTIA Security+ mcq questions with answer – Set 4

Important Instructions:

  • Total Number Of Questions : 10
  • Passing Marks : 7
  • Each Question Carry 1 Mark, No Negative Marking.
  • Do Not Refresh The Page.
  • This Is A FREE Online Test, DO NOT Pay Money To Anyone To Attend This Test.
  • Best Of Luck…

Results

-

#1. The present method of requiring access to be strictly defined on every object is proving too cumbersome for your environment. The edict has come down from upper management that access requirements should be slightly reduced. Which access model allows users some flexibility for information-sharing purposes?

#2. A newly hired junior administrator will assume your position temporarily while you attend a conference. You’re trying to explain the basics of security to her in as short a period of time as possible. Which of the following best describes an ACL?

#3. Upper management has suddenly become concerned about security. As the senior network administrator, you are asked to suggest changes that should be implemented. Which of the following access methods should you recommend if the technique to be used is one that is primarily based on preestablished access and can’t be changed by users?

#4. Your office administrator is being trained to perform server backups. Which authentication method would be ideal for this situation?

#5. You’ve been assigned to mentor a junior administrator and bring him up to speed quickly. The topic you’re currently explaining is authentication. Which method uses a KDC to accomplish authentication for users, programs, or systems?

#6. After a careful risk analysis, the value of your company’s data has been increased. Accordingly, you’re expected to implement authentication solutions that reflect the increased value of the data. Which of the following authentication methods uses more than one authentication process for a logon?

#7. You’re the administrator for Mercury Technical. Due to several expansions, the network has grown exponentially in size within the past two years. Which of the following is a popular method for breaking a network into smaller private networks that can coexist on the same wiring and yet be unaware of each other?

#8. Your company provides medical data to doctors from a worldwide database. Because of the sensitive nature of the data, it’s imperative that authentication be established on each session and be valid only for that session. Which of the following authentication methods provides credentials that are valid only during a single session?

#9. You have added a new child domain to your network. As a result of this, the child has adopted all of the trust relationships with other domains in the forest that existed for its parent domain. What is responsible for this?

#10. Which of the following security areas encompasses network access control (NAC)?

CHECK ANSWER
Rate this post
You May Also Like :   CompTIA Security+ mcq questions with answer - Set 5
Scroll to Top