⚡️Lightning Sale: 25% off Lifetime Membership ⚡️

18 hours, 50 minutes remaining!
CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

CompTIA Security Plus SY0 401 Test 6

Free CompTIA Security+ SY0-401 practice test, CompTIA Security Plus SY0 401 Test 6. This free CompTIA Security+ practice exam covers basic knowledge in the field of Information Systems Security. To pass the CompTIA Security+ exam, a candidate will need knowledge in Network Security, Compliance and operational security, threats and vulnerabilities, access control and identity management, cryptography, and application, data, and host security. This free practice test will test your knowledge and readiness for the CompTIA Security+ Examination.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

What is the default port of Kerberos?

  • 88

  • 8080

  • 22

  • 443

Which of the following is an access control method, which is based of a persons job?

  • DAC

  • RBAC

  • HMAC

  • MAC

Which authentication protocol periodically verifies a client with a 3-way handshake?

  • CHAP

  • PAP

  • SSO

  • Kerberos

Which of the following is a computer hardware component that can process and store cryptographic keys?

  • WPA2

  • EULA

  • TPM

  • HCL

SHA and MD5 are examples of which of the following?

  • Hashing algorithms

  • Tunneling protocols

  • Encryption algorithms

  • HIPS

True or False: It is good practice to disable unused or publicly accessible network ports?

  • False

  • True

Which of the following is a Denial of Service attack using a succession of TCP Handshake requests?

  • SYN Flood

  • Xmas Attack

  • Smurf Attack

  • Phishing

When converted into binary, how many bits are present in an IPv4 Address?

  • 64

  • 48

  • 128

  • 32

Which of the following is a common synonym for a Protocol Analyzer?

  • Port scanner

  • layer 3 switch

  • Packet Sniffer

  • Intelligent HUB

Which port is used by telnet?

  • 21

  • 22

  • 23

  • 20

Which option will provide short-term system availability in case of loss or failure?

  • Cold Site

  • RAID 0

  • Full disk encryption

  • RAID 5

A server on your network needs to be accessed by external users. The content of the server should be publicly available and does not contain any confidential information. Where should you place it?

  • Behind an IPsec tunneling firewall

  • Intranet

  • DMZ

  • Behind the firewall and NAT service

Which of the following protocols is used to encrypt emails?

  • SMTP

  • SMAP

  • HTTPS

  • PGP

Which of the following choices properly defines the term war chalking?

  • Cracking a WEP2 WiFi encryption

  • Driving in a vehicle and scanning for open WiFi access points

  • Marking open WiFi access points

  • Port Scanning a wifi network

Which of the following is a protocol that prevents loops in layer 2 switching devices?

  • STP

  • RDP

  • HVAC

  • TCP

Which of the following is an example of multi-factor authentication?

  • Fingerprint and iris scan

  • Password and pin

  • Smart card and ID badge

  • Pin number and smart card

What port is used for HTTPS?

  • 8080

  • 443

  • 69

  • 80

A list of permissions on a router that determines who can access specific areas of a network, is known as what?

  • OEM

  • ACL

  • FAQ

  • Firewall

Which of the following STOPS attacks on a host system?

  • NIDS

  • NIPS

  • HIPS

  • HIDS

Which of the following describes the most secure firewall configuration?

  • Deny all protocols, allow TCP/IP

  • Allow all, deny malicious applications and ports

  • Deny all, with exceptions for required applications and ports

  • Deny all UPD, allow all TCP



Remaining Time 00:15:00