CompTIA Bridge Exam – Security+

 

QUESTION 51

Which security action should be finished before access is given to the network?

 

A.

Identification and authorization

B.

Identification and authentication

C.

Authentication and authorization

D.

Authentication and password

 

Correct Answer: B

 

 

QUESTION 52

To aid in preventing the execution of malicious code in email clients, which of the following should be done by the email administrator?

 

A.

Spam and anti-virus filters should be used

B.

Regular updates should be performed

C.

Preview screens should be disabled

D.

Email client features should be disabled

 

Correct Answer: A

 

 

QUESTION 53

Which security applications require frequent signature updates? (Select TWO).

 

A.

Antivirus

B.

Firewall

C.

PKI

D.

IDS

 

Correct Answer: AD

 

 

QUESTION 54

In computing, virtualization is a broad term that refers to the abstraction of computer resources. Which is a security reason to implement virtualization throughout the network infrastructure?

 

A.

To implement additional network services at a lower cost

B.

To analyze the various network traffic with protocol analyzers

C.

To isolate the various network services and roles

D.

To centralize the patch management of network servers

 

Correct Answer: C

 

 

QUESTION 55

Which of the following access control models uses roles to determine access permissions?

 

A.

MAC

B.

DAC

C.

RBAC

D.

None of the above.

 

Correct Answer: C

 

 

QUESTION 56

A user receives an email asking the user to reset the online banking username and password. The email contains a link and when the user accesses the link, the URL that appears in the browser does not match the link. This would be an example of:

 

A.

spoofing

B.

phishing

C.

hijacking

D.

redirecting

 

Correct Answer: B

 

 

 

 

 

QUESTION 57

In computer networking, network address translation (NAT) is the process of modifying network address information in datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another. Which description is true about a static NAT?

 

A.

A static NAT uses a many to many mapping.

B.

A static NAT uses a one to many mapping.

C.

A static NAT uses a many to one mapping.

D.

A static NAT uses a one to one mapping.

 

Correct Answer: D

 

 

QUESTION 58

Which of the following protects the confidentiality of data by making the data unreadable to those who don’t have the correct key?

 

A.

Hashing

B.

Digital signatures

C.

Encryption

D.

Non-repudiation

 

Correct Answer: C

 

 

QUESTION 59

The term tunneling protocol is used to describe when one network protocol called the payload protocol is encapsulated within a different delivery protocol. Which of the following can be used to institute a tunneling protocol for security?

 

A.

FTP

B.

IPX/SPX

C.

IPSec

D.

EAP

 

Correct Answer: C

 

 

QUESTION 60

John works as a network administrator for his company. He uses a tool to check SMTP, DNS, POP3, and ICMP packets on the network. This is an example of which of the following?

 

A.

A vulnerability scan

B.

A protocol analyzer

C.

A penetration test

D.

A port scanner

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA BR0-001 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …