CompTIA A+ 1000 – Part 2
Module 10: Security Fundamentals
1. Which type of malware tricks a user into running a program which subsequently does something totally different than what the user had expected?
Choose one answer.
- Worm
- Trojan virus
- Ransomware
- Spyware
==============================================
2. RAID is utilized to store duplicated data on multiple discs providing multiple backups. Which level of RAID requires a minimum of three drives and writes to all of them?
Choose one answer.
- RAID Level 5
- RAID Level 3
- RAID Level 0
- RAID Level 1
==============================================
3. Which of these is a type of network attack in which a hacker modifies the source address of the network packet to alter it and make it look as though it were coming from another sender?
Choose one answer.
- Spoofing
- Session hijacking
- Zero-day attack
- Eavesdropping attack
==============================================
4. If you wanted to encrypt communications from an employee’s computer back to the office network, which of these would you use?
Choose one answer.
- Access-control list
- DLP
- VPN
- Directory permissions
==============================================
5. Highly-secure environments use multiple authentication techniques. Which of these is NOT included in the three types of authentication?
Choose one answer.
- Something you know
- Something you have
- Something you are
- Something you need
==============================================
6. There are three types of backups and each has a different application. If you were performing a backup that copied any files that had been changed and clears the archive bit you would be performing which type of backup?
Choose one answer.
- Incremental backup
- Full backup
- Differential backup
- None of these
==============================================
7. True or False: Authentication is the process of proving an identity to a network.
Answer true or false
- True
- False
==============================================
8. If a network were attacked with a virus that prevents the system from performing its normal function or replies that the system is busy, which of these may have occurred?
Choose one answer.
- Man-in-the-middle attack
- Eavesdropping attack
- Spoofing
- Denial-of-service
==============================================
9. Physical security ensures people cannot physically access a system. What type of physical security is used which will notify you if a cover is taken off a system?
Choose one answer.
- Intrusion detection
- Passwords
- Secure server replacement
- Trusted platform module
==============================================
10. A type of encryption, commonly used on websites, which encrypts traffic by applying a digital certificate is __________.
Choose one answer.
- Secure Sockets Layer (SSL)
- Internet Protocol Security (IPSec)
- Virtual Private Network (VPN)
- COMSEC