CompTIA Security+ Exam Prep - Question List

Select how would you like to study

96. What has the capability that allows a protocol to distinguish between different classes of messages and assign priority levels?
  1. Best-effort Service
  2. Quality of Service
  3. Differentiated Service
  4. Guaranteed Service
97. Which of the following protocols operates on 2.4GHz and has a bandwidth of 1Mbps or 2Mbps?
  1. 802.11g
  2. 802.11a
  3. 802.11b
  4. 802.11
98. Rebecca wishes to control how data can flow into and out of her network. She spoke to her boss about problems the office is experiencing with data flow. He took it upon himself to purchase a program, but the program cannot prevent attacks that employ application-specific vulnerabilities. What did the boss purchase?
  1. Stateful Firewall
  2. Proxy Firewall
  3. Firewall Inspector
  4. Packet-filtering Firewall
99. Rebecca returned the Packet-filtering Firewall that she bought to control the data that can flow into and out of a network. Instead, Rebecca went and bought the fifth-generation firewall that creates dynamic, customized TCP/IP stacks when a packet needs to be evaluated. What firewall did Rebecca purchase?
  1. Stateful Firewall
  2. Kernel Proxy Firewall
  3. Firewall Inspector
  4. Packet-filtering Firewall
100. What is the main gate between users and corporate web-based resources?
  1. Web Portal
  2. Internet Security
  3. Identity Management
  4. Web Access Management

Select how would you like to study