1. What does authentication do?
2. What methods monitor a network for the possible penetration of security measures?
3. Packet filter, circuit-level gateway, and application-level gateway are all forms of what?
4. What form of security management do firewalls implement?
5. What TCP/IP service enables a LAN to use private IP addresses for internal traffic and public IP addresses for external traffic?
6. What computing technology has the capability to simulate an operating system, a server, a storage device, or other network resources?
7. What IPv6 protocol set provides for the secure exchange of packets at the Network or IP layer?
8. Which mode of IPSec should you use to assure the integrity and confidentiality of data within the same LAN?
9. What IEEE standard defines Extensible Authentication Protocol?
10. What element of a security policy limits an employee's access to only those records or assets she needs to do her job?
11. What type of risk control provides a method or strategy for handling the aftermath of a potential security event?
12. Which one of the following is NOT a resource protected by data loss prevention (DLP) controls?
13. What is the correct order of the following incident response steps? A. RTO. B. Create backups or data captures of the suspected systems or devices. C. Isolate the suspect or affected systems or devices. D. Follow up on causes and vulnerabilities. E. Resolve the issues.
14. Which of the following has the highest (most important) order of volatility?
15. What is the chronological documentation of the seizure, custody, control, transfer, analysis, and disposition of any evidence, physical or digital, gathered during the investigation of an incident?
CompTIA Security+ Certification Prep Part 1
You got {{userScore}} out of {{maxScore}} correct