CompTIA Security+ Exam Prep - Question List

Select how would you like to study

316. There are many different types of computer crimes that can be committed with different methods. What computer crime allows an attacker to eavesdrop?
  1. Excessive Privileges
  2. Data Diddling
  3. Salami
  4. Emanations Capturing
317. What type of evidence pertains to oral or written evidence presented in court that has no firsthand proof of accuracy or reliability?
  1. Corroborative Evidence
  2. Hearsay Evidence
  3. Surveillance Evidence
  4. Opinion Evidence
318. Mitch must review audit trail information. What is the method for such a review?
  1. Manually
  2. Automated
  3. Both A and B
  4. Neither A nor B
319. Theresa is suspicious of an employee’s activity when they are logged-on to their computer. Theresa decides to monitor this employee for fraudulent activity, but plans to review the information later. What type of monitoring is Theresa using?
  1. Manual Watching
  2. Cameral Surveillance
  3. Keystroke Monitoring
  4. Access Control Snooping
320. What type of access control is principled on the idea that individuals should be given access only to the information they absolutely require in order to perform their job duties?
  1. Statistical anomaly-based IDS
  2. Network Sniffers
  3. Default to No Access
  4. Need-to-know

Select how would you like to study