Security+ Certification Exam 2011 version 試験
Question No : 1
An achievement in providing worldwide Internet security was the signing of certificates associated with which of the following protocols?
Question No : 2
Which of the following is best practice to put at the end of an ACL?
Question No : 3
Which of the following devices is BEST suited to protect an HTTP-based application that is susceptible to injection attacks?
Question No : 4
Which of the following must be kept secret for a public key infrastructure to remain secure?
Question No : 5
A forensic analyst is asked to respond to an ongoing network attack on a server. Place the items in the list below in the correct order in which the forensic analyst should preserve them.
Question No : 6
Drag and drop the correct protocol to its default port.
Question No : 7
Which of the following symmetric key algorithms are examples of block ciphers? (Select THREE).
Question No : 8
Which of the following protocols uses TCP instead of UDP and is incompatible with all previous versions?
Question No : 9
A trojan was recently discovered on a server. There are now concerns that there has been a security breach that allows unauthorized people to access data.
The administrator should be looking for the presence of a/an:
Question No : 10
An administrator notices that former temporary employees’ accounts are still active on a domain.
Which of the following can be implemented to increase security and prevent this from happening?
Question No : 11
An administrator is concerned that a company’s web server has not been patched.
Which of the following would be the BEST assessment for the administrator to perform?
Question No : 12
How often, at a MINIMUM, should Sara, an administrator, review the accesses and right of the users on her system?
Question No : 13
Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a page is displayed notifying him that this site cannot be visited.
Which of the following is MOST likely blocking Pete’s access to this site?
Question No : 14
Which of the following is a hardware-based security technology included in a computer?
Question No : 15
-- Exhibit C
-- Exhibit -
Which of the following BEST describes the type of attack that is occurring? (Select TWO).