Assessment Test
1. Which type of audit can be used to determine whether accounts have been established properly and verify that privilege creep isn’t occurring?
A. Privilege audit
B. Usage audit
C. Escalation audit
D. Report audit
2. What kind of physical access device restricts access to a small number of individuals at one time?
A. Checkpoint
B. Perimeter security
C. Security zones
D. Mantrap
3. Which of the following is a set of voluntary standards governing encryption?
A. PKI
B. PKCS
C. ISA
D. SSL
4. Which protocol is used to create a secure environment in a wireless network?
A. WAP
B. WEP
C. WTLS
D. WML
5. An Internet server interfaces with TCP/IP at which layer of the DOD model?
A. Transport layer
B. Network layer
C. Process layer
D. Internet ...
Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.