CompTIA A+ 220-701/702 Practice Exam - Question List

Select how would you like to study

126. John observes that a server in his network has a program running on it that bypasses authorization. Which type of attack has occurred?
  1. DoS
  2. DDoS
  3. Social engineering
  4. Back door
127. John’s organization follows a hierarchical approach to data access, with IT personnel having full access, engineering personnel having slightly lesser access and managers having access to only their own department files. Which of the following access control models is in use?
  1. DAC
  2. DBAC
  3. MAC
  4. RBAC
128. Which of these attacks use more than one computer to attack a network or a victim?
  1. DoS
  2. DDoS
  3. UDP attack
  4. Worm
129. Which of these methods allows an organization to expose a single TCP/IP address to the Internet while utilizing private IP addressing across the LAN?
  1. Extranet
  2. VLAN
  3. DMZ
  4. NAT
130. Which of the following access control models allows access control determinations to be performed based on the security labels associated with each user and each data item?
  1. RBAC
  2. DBAC
  3. MAC
  4. DAC

Select how would you like to study