CompTIA Security+ Exam Prep - Question List

Select how would you like to study

1. Which of these malicious agents are capable of distributing themselves without the use of a host file?
  1. Trojan
  2. Stealth Virus
  3. Logic Bomb
  4. Worm
2. John is working as a security advisor. Of late, he is going nuts with the number of virus infected computers reported to the IT department every day. A common cause of this seems to be virus infection while using web browsers. Which of the following should John advise the IT department to do to resolve the problem?
  1. Disable unauthorized ActiveX controls
  2. Implement a VPN
  3. Install a firewall
  4. Re-install the OS
3. Which of the following technologies allows a connection to be made between two networks using secure protocols?
  1. Tunneling
  2. DMZ
  3. VLAN
  4. Firewall
4. Which of the following viruses could attach itself to the boot sector of your disk to avoid detection and report false information about file sizes?
  1. Boot sector virus
  2. Stealth virus
  3. Polymorphic virus
  4. Worm
5. John notices that his hard disk LED is on, even though he isn’t doing anything on the computer and it isn’t connected to the Internet. Which of the following could be causing this?
  1. A disk failure is imminent
  2. TCP/IP hijacking is being attempted
  3. System is under a DoS attack
  4. Virus activity on his system

Select how would you like to study