CompTIA 220-801 Certification Practice Test - Question List

Select how would you like to study

121. Jack is a security advisor in his company. All users need to connect to an FTP server for data exchange using the FTP protocol. Considering the fact that FTP is an unsecure protocol, which of the following protocols should he replace the FTP protocol with?
  1. DNS
  2. HTTP
  3. TFTP
  4. SFTP
122. Which of the following is often misused by spyware to collect and report a user’s activities?
  1. Tracking cookie
  2. Session cookie
  3. Normal cookie
  4. Collection cookie
123. John observes that a server in his network has a program running on it that bypasses authorization. Which type of attack has occurred?
  1. DoS
  2. DDoS
  3. Social engineering
  4. Back door
124. John’s organization follows a hierarchical approach to data access, with IT personnel having full access, engineering personnel having slightly lesser access and managers having access to only their own department files. Which of the following access control models is in use?
  1. DAC
  2. DBAC
  3. MAC
  4. RBAC
125. Which of these attacks use more than one computer to attack a network or a victim?
  1. DoS
  2. DDoS
  3. UDP attack
  4. Worm

Select how would you like to study