CompTIA Security+ Exam Prep - Question List

Select how would you like to study

26. Which of the following defines a condition that can occur when an application receives more data than it’s programmed to accept?
  1. Spoofing
  2. Buffer Overflow
  3. Spam
  4. Back door entry
27. Jack is a security advisor in his company. All users need to connect to an FTP server for data exchange using the FTP protocol. Considering the fact that FTP is an unsecure protocol, which of the following protocols should he replace the FTP protocol with?
  1. DNS
  2. HTTP
  3. TFTP
  4. SFTP
28. John is using IE version 6.0 as his browser. He wants to enable ActiveX controls and he also wants a high level of security set for the Internet zone. How can he accomplish this?
  1. Re-install the browser.
  2. Upgrade to IE 7.0.
  3. He cannot accomplish this.
  4. If the security level for Internet is high, the ActiveX controls are automatically disabled. Modify the ActiveX controls in Custom Level tab.
29. Which of the following is often misused by spyware to collect and report a user’s activities?
  1. Tracking cookie
  2. Session cookie
  3. Normal cookie
  4. Collection cookie
30. John is getting frequent complaints from users about receiving unsolicited e-mails from an e-mail address. What should he do to prevent this from occurring?
  1. Configure Outlook to block these e-mails.
  2. Configure a rule in each user’s router and restart the router.
  3. Configure the firewall to block e-mails.
  4. Install an anti-spam filter on the domain mail servers and filter the e-mail address.

Select how would you like to study