Review Questions

1. What method of access control is best suited for environments with a high rate of employee turnover?

A. MAC

B. DAC

C. RBAC

D. ACL

2. Which of the following is the strongest form of authentication?

A. Biometric

B. Two-factor

C. “Something you have”

D. Username and password

3. Kerberos is used to perform what security service?

A. Authentication protection

B. File encryption

C. Secure communications

D. Protected data transfer

4. Which is the strongest form of password?

A. More than eight characters

B. One-time use

C. Static

D. Different types of keyboard characters

5. Which of the following technologies can be used to add an additional layer of protection between a directory services–based network and remote clients?

A. SMTP ...

Get CompTIA Security+™: Review Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.