CompTIA Security+ Exam Prep - Question List

Select how would you like to study

111. Which of the following is a Bluetooth-based attack that relates to gaining unauthorized access through a Bluetooth connection?
  1. Blue-theft
  2. Blue-access
  3. Blue jacking
  4. Bluesnarfing
112. John is a receiving a lot of spam through the Bluetooth connection in his PDA. What kind of vulnerability is he facing?
  1. Blue mail
  2. Blue Spam
  3. Bluesnarfing
  4. Blue jacking
113. Mary works at a school as an infrastructure administrator. Teachers have complained to management about students misusing the Internet in the computer labs. Which of the following should Mary implement to stop the misuse of Internet?
  1. Firewall
  2. Anti-virus
  3. Latest security patches
  4. Content filtering software
114. What type of protocol is used by remote users to authenticate over PPP lines and is the least secure authentication method?
  1. Password Authentication Protocol (PAP)
  2. Routing Information Protocol (RIP)
  3. Internet Control Message Protocol (ICMP)
  4. Address Resolution Protocol (RARP)
115. Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language allows an application to communicate with a database either locally or remotely?
  1. Object Linking and Embedding Database
  2. ActiveX Data Objects
  3. Java Database Connectivity
  4. Open Database Connectivity

Select how would you like to study