CompTIA Security+ SY0-701 Practice Test 1
Exam Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the exam before. Hence you can not start it again.
Exam is loading…
You must sign in or sign up to start the exam.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
-
Need More Help?
PocketPrep is our recommended provider for CompTIA Security+ prep courses. Make sure you pass your exam the first time around.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
Company XYZ has been implementing Microsoft Office Communications Server 2007 R2 servers, unified communications clients, and unified communications applications.
They are now conducting the transition from solution to support. This project phase is referred to as?
CorrectIncorrect -
Question 2 of 10
2. Question
A Telecommunication company has taken some employees to court over suspected fraud and illegal use of company assets. You are part of the team charged with collecting evidence and preserving the admissibility of the evidence.
Which type of forensic techniques are you likely to use?
CorrectIncorrect -
Question 3 of 10
3. Question
An employee in the research department has been browsing the Internet when a Malware infection on the host occurred. As a technician, which log is likely to reveal the origin of the infection?
CorrectIncorrect -
Question 4 of 10
4. Question
A huge hospital in New Jersey bought a Cancer Immunotherapy equipment that uses Radiation therapy. This is a clinical modality that uses ionizing radiation in the treatment of patients with malignant neoplasia (and occasionally benign disease).
The equipment has an embedded OS that was vulnerable during the last two assessments by the auditors. Which of the following BEST explains the appliance vulnerable state?
CorrectIncorrect -
Question 5 of 10
5. Question
Kim works with a reputable pharmaceutical and travels with his laptop everywhere. He uses public WiFi at various hotspots. Choose any two methods that would guarantee no device can access his laptop directly?
CorrectIncorrect -
Question 6 of 10
6. Question
Consider this scenario. A user logs into a website/application with a username and password. A unique one-time code is generated on the server and sent via email to the user.
The user retrieves the code from the email and enters the code into the app. This is a perfect case of:
CorrectIncorrect -
Question 7 of 10
7. Question
Large corporations stretch their resources to secure their computer networks. One way to avoid the spread of worms over the entire corporate network that include servers, routers, switches, workstations etc. would be to:
CorrectIncorrect -
Question 8 of 10
8. Question
A DMZ (demilitarized zone), also known as a perimeter network or a screened subnetwork, is a physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks like the public internet.
Which of the following are true for a DMZ?
CorrectIncorrect -
Question 9 of 10
9. Question
You are consulting for a customer who wants servers with high security. You have decided to use encrypted hard drives and a secure boot process with all the servers.
The servers will be using a hardware chip on the motherboard to facilitate the use of encrypted hard drives and the secure boot process.
In this scenario, each server should have which component?
CorrectIncorrect -
Question 10 of 10
10. Question
Technology Solutions Center is a reputable high achieving software development company. The company attributes her success in following strict SDLC.
After successfully carrying out requirement gathering and analysis and design, what other phases should follow in order?
CorrectIncorrect