CompTIA Security+ Exam Prep - Question List

Select how would you like to study

136. Jeremy wants to sneak unauthorized information in an unauthorized manner. How would he do that?
  1. Channel Decipher
  2. Covert Channels
  3. Storage Convert
  4. Decipher Storage
137. What do security evaluations examine?
  1. Security-relevant parts of a system
  2. Assurance Policies
  3. Security Policies
  4. Security Infrastructure of department
138. What was the first attempt at establishing a single standard for evaluating security attributes of computer systems and products by many European countries?
  1. Trusted Computer System Evaluation Criteria
  2. Information Technology Security Evaluation Criteria
  3. Both A and B
  4. Neither A nor B
139. What type of model enables an application system to be divided across multiple platforms?
  1. Environment Model
  2. Application Model
  3. Client/Server Model
  4. Functionality Model
140. Security is one of the most important issues an organization must discuss. Mitch wants security that is built into an application. Why would this be a problem?
  1. Mitch isn’t the head of security.
  2. Security is usually within security products and perimeter devices.
  3. The security application is far too expensive.
  4. All of the above

Select how would you like to study