O'Reilly logo

CompTIA Security+™: Study Guide, Third Edition by Emmett Dulaney, Mike Pastore

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Assessment Test

  1. Which type of audit can be used to determine whether accounts have been established properly and verify that privilege creep isn't occurring?

    1. Privilege audit

    2. Usage audit

    3. Escalation audit

    4. Report audit

  2. What kind of physical access device restricts access to a small number of individuals at one time?

    1. Checkpoint

    2. Perimeter security

    3. Security zones

    4. Mantrap

  3. Which of the following is a set of voluntary standards governing encryption?

    1. PKI

    2. PKCS

    3. ISA

    4. SSL

  4. Which protocol is used to create a secure environment in a wireless network?

    1. WAP

    2. WEP

    3. WTLS

    4. WML

  5. An Internet server interfaces with TCP/IP at which layer of the DOD model?

    1. Transport layer

    2. Network layer

    3. Process layer

    4. Internet layer

  6. You want to establish a network connection between two LANs using the Internet. Which technology ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required