CompTIA Security+ Exam Prep - Question List

Select how would you like to study

16. Which of the following is a term used to define a collection of software robots-or bots-that run autonomously and automatically and may harm your computer?
  1. Automizer
  2. Botnet
  3. Softbots
  4. Rootkit
17. Which of the following is a major difference between a Worm and a Trojan horse?
  1. Worms spread via e-mail, while Trojan horses don’t.
  2. Worms are a form of malicious code, where as Trojan horses are not.
  3. Both are the same.
  4. Worms self replicate, while Trojan horses don’t.
18. Which of the following have the ability to hide certain processes and connections from the operating system?
  1. Rootkit
  2. Worm
  3. Botnet
  4. Logic Bomb
19. John is a security advisor at his organization. A number of anonymous users are complaining about data being stolen from their computers. Which of the following should he enforce to avoid data theft?
  1. Multi factor authentication
  2. Token authentication
  3. Smart card authentication
  4. No removable-media drives or ports on the computers policy
20.

Which of the following is a method of removing or bypassing a BIOS password?

  1. Change memory card
  2. Re-connect all drive cables to the motherboard
  3. Remove the CMOS battery
  4. Restart the computer

Select how would you like to study