CompTIA Server+ - Question List

Select how would you like to study

101. Jack is a security advisor in his company. All users need to connect to an FTP server for data exchange using the FTP protocol. Considering the fact that FTP is an unsecure protocol, which of the following protocols should he replace the FTP protocol with?
  1. DNS
  2. HTTP
  3. TFTP
  4. SFTP
102. John observes that a server in his network has a program running on it that bypasses authorization. Which type of attack has occurred?
  1. DoS
  2. DDoS
  3. Social engineering
  4. Back door
103. Which of the following is a server placed in a corporate network for the purpose of attracting a potential intruder’s attention?
  1. Scanner
  2. NAT
  3. Firewall
  4. Honeypot
104. Which of the following proxy server types accelerates service requests by retrieving content saved from a previous request?
  1. Hostile proxy
  2. Caching proxy server
  3. Content-filtering web proxy
  4. Anonymous proxy server
105. John wants to implement a proxy server with a functionality that controls the websites accessed by the employees of the organization. Which of these proxies would serve his purpose?
  1. Blocking proxy
  2. Caching proxy
  3. Web proxy
  4. Content-filtering proxy

Select how would you like to study