CompTIA Security+ Exam Prep - Question List

Select how would you like to study

31. John wants to install multiple operating systems on a Windows XP operating system platform. Which of the following application developers could provide this application?
  1. Microsoft
  2. VMware
  3. McAfee
  4. Norton
32. John observes that a server in his network has a program running on it that bypasses authorization. Which type of attack has occurred?
  1. DoS
  2. DDoS
  3. Social engineering
  4. Back door
33. Which of the following NIDS configurations is based solely on specific network traffic?
  1. Anomaly based
  2. Behavior based
  3. Signature based
  4. A signature-based
34. Which of the following best describes the purpose of an SSID in a wireless network?
  1. Identifying the network
  2. Better signal strength
  3. Better connectivity
  4. Encryption
35. John wants to hide his wireless network and protect it from unauthorized access. Which of the following should be used to prevent the network from being accessed in an unauthorized manner?
  1. Use sniffer software.
  2. Change the name of your wireless network.
  3. Turn off the SSID broadcast.
  4. Have a router password.

Select how would you like to study