Security+ Questions

February 17, 2009

Welcome to my Security+ miniature quiz (only 10 questions)

As I am studying for my Security+ exam I create questions to test myself with; this in turn helps me to learn more.

So as I plod through chapter by chapter (Sybex’s book) I will create my own questions and post it here in my blog.

If there are any errors/mistakes blame me (also correct me please) and not the books I use.

1) Which policy outlines the guidelines and expectations for computer upgrades, backups and audits?

A) PKI
B) Information Policies
C) Administrative Policies
D) Business Relations Policies.

2) What policy deals with all aspects of information security; including data storage, classification levels, data transmission,
and the destruction of sensitive information?

A) Incident-Response Policies
B) Information Policies
C) Usage Policies
D) Accountability Policies

3) Which policy defines the network and systems configuration of an organization? This policy also deals with identification
and authentication (I&A).

A) DRP
B) CRT
C) Security Policies
D) Hardware Redundancy Policies

4) Which policy covers how a company’s information and resources can be used? This policy covers statements about privacy, ownership,
and the consequences of improper actions.

A) Usage Policies
B) Management Control Policies
C) Information Policies
D) Administrative Policies.

5) Which Access Control Method uses labels?

A) MAC
B) DAC
C) SAC
D) RBAC

6) Which Access Control Method allows an employee to act in a certain predetermined manner based on their role in an organization?

A) MAC
B) DAC
C) SAC
D) RBAC

7) Which authentication protocol uses a Key Distribution Center?

A) CHAP
B) MS-CHAP
C) Kerberos
D) PAP

8 ) Which of the follow can NOT be used for a biometric system?

A) Retinal Scans
B) Keystroke Patterns
C) Fingerprints
D) Passwords

9) You want to let a remote business partner access some data on your servers; what should you set up to make this data available?

A) Internet
B) Extranet
C) Intranet
D) Ohmnet

10) You want to give the general public access to your web servers, while at the same time protecting your business network.
Where should you put the web servers to keep them isolated while still granting access to the public?

A) TMAC
B) SHA-1
C) DMK
D) DMZ

The answers:

 

 

 

1) C
2) B
3) C
4) A
5) A
6) D
7) C
9) D
9) B
10)D

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: