CompTIA Security+ Practice Test 1 SY0-401

CompTIA Security+ Practice Test 1 SY0-401


A systems administrator is tasked with auditing user privileges. Which of the following steps must be taken? (Select two correct answers.)

 

 

 

 

Which of the following best practices makes a wireless network more difficult to find?

 

 

 

 

Which of the following is a security reason to implement virtualization in your network?

 

 

 

 

Which of the following describes an LDAP injection attack?

 

 

 

 

When an employee discovers someone wandering around a secured area without a badge or escort, which user-awareness training topic should provide them with the proper response?

 

 

 

 

Which of the following best describes the difference between a cipher lock and a wireless lock?

 

 

 

 

Antivirus software preserves which two elements of data security?

 

 

 

 

Which of the following should be used when a business needs a block cipher with minimal key size for internal encryption?

 

 

 

 

The policy preventing too much power leading to corruption is called the __________________ policy.

 

 

 

 

An administrator wants to reduce the size of the attack surface of Windows server 2008. Which of the following is the best answer to accomplish this?

 

 

 

 


Question 1 of 10

More Tests