Chapter 04 – Securing Your Network

Ref: CompTIA Security Plus Get Certified Get Ahead SY0-701 Study Guide

CompTIA Security+ (SY0-701) – Chapter 4

1 / 93

Which of the following statements is correct according to the text?

2 / 93

What is one of the major benefits of using a centralized RADIUS server as compared to separate databases for each VPN server?

3 / 93

Which EAP method requires certificates on both the server and the clients?

4 / 93

What does Chapter 3, ’Exploring Network Technologies and Tools’, cover?

5 / 93

Where does a VPN server typically send a user’s log-in credentials for validation?

6 / 93

What is the role of an 802.1X server in a network?

7 / 93

What is the main difference between Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs)?

8 / 93

What is the primary purpose of a honeypot in a network security context?

9 / 93

What is one significant characteristic of the EAP-TTLS authentication protocol?

10 / 93

What does a Replay attack in the context of RFID systems refer to?

11 / 93

What is the main function of a honeyfile in cybersecurity?

12 / 93

What is a true negative in IDS or IPS?

13 / 93

What does a heat map produced by a site survey tool show in a wireless network?

14 / 93

What were some of the early wireless cryptographic protocols, and why are they not recommended for use today?

15 / 93

What is one method of performing a site survey when planning and deploying a wireless network?

16 / 93

Which wireless standard uses both the 2.4 GHz and 5 GHz bands?

17 / 93

Which cryptographic protocol does WPA3 use instead of the Pre-shared Key (PSK) used with WPA2?

18 / 93

Which of the following represents a common type of RFID attack?

19 / 93

What is the key difference between PEAP and EAP-TLS?

20 / 93

Which EAP method provides an extra layer of protection for the usual EAP method by encapsulating and encrypting the EAP conversation in a Transport Layer Security (TLS) tunnel?

21 / 93

What is a captive portal and how can it be used as an alternative to IEEE 802.1X?

22 / 93

What is a primary feature or capability of signature-based IDSs?

23 / 93

Which of the following statements is correct regarding Wireless Access Points (APs) and wireless routers based on the given text?

24 / 93

Which of the following is the BEST description of an Evil Twin in network security?

25 / 93

Which of the following accurately describes the term ’Bluesnarfing’?

26 / 93

Which of the following authentication protocols was designed by Cisco as a secure replacement for Lightweight EAP (LEAP), and supports but does not require certificates?

27 / 93

Why is physical security important for Access Points (APs)?

28 / 93

What is a false positive in the context of IDSs?

29 / 93

Which of the following statements about Wi-Fi Protected Setup (WPS) is not true?

30 / 93

What is a significant weakness of the Password Authentication Protocol (PAP)?

31 / 93

What is a false positive in the context of IDS or IPS?

32 / 93

What is the difference between Bluesnarfing and Bluebugging?

33 / 93

What is the potential threat of fake telemetry data in SCADA systems as shown in the Massachusetts example?

34 / 93

What is the main difference between an Omni and directional antenna?

35 / 93

What are the two essential security benefits that TACACS+ provides over RADIUS?

36 / 93

What is the purpose of a honeynet in cyber security?

37 / 93

What method can an attacker use to bypass MAC filtering in a wireless network?

38 / 93

What is the best protection against wireless replay attacks?

39 / 93

What role must be enabled to create a VPN on a Windows server?

40 / 93

What is the primary purpose of a captive portal in the context of paid internet access?

41 / 93

What is the primary difference between War Driving and War Flying?

42 / 93

What is a rogue access point (rogue AP) as discussed in the text?

43 / 93

Which wireless security protocol is most vulnerable to attacks?

44 / 93

Why is L2TP not used by itself for VPN traffic?

45 / 93

What differentiates an always-on VPN from an on-demand VPN?

46 / 93

What describes a key way in which heuristic/behavioral detection systems operate?

47 / 93

What are the cryptographic protocols used by WPA2 (IEEE 802.11i)?

48 / 93

What is the main consequence of a SYN flood attack?

49 / 93

What is the primary difference between IPS and IDS systems?

50 / 93

In IPsec, what is the benefit of using Tunnel mode over Transport mode?

51 / 93

What is the purpose of reporting based on rules within an Intrusion Detection System (IDS)?

52 / 93

Which of the following best describes the action of a ’bluebugging’ attack?

53 / 93

What is the primary purpose of a captive portal?

54 / 93

What is the difference between a wireless access point (AP) and a wireless router according to the CompTIA Security+ SY0-701 text?

55 / 93

What makes Protected EAP (PEAP) different from other authentication protocols?

56 / 93

What is one of the issues related to wireless networks mentioned in the text?

57 / 93

What is a disassociation attack?

58 / 93

What does an HTML5 VPN portal use to encrypt its sessions?

59 / 93

What are the two primary detection methods used for attack detection in an IDS (Intrusion detection system)?

60 / 93

Which of the following protocols does NOT provide all three AAA services; authentication, authorization, and accounting?

61 / 93

What is the difference between the use of credentials in the Enterprise mode and PSK mode in WPA2, and which one provides the authentication?

62 / 93

What is one of the goals of a honeypot?

63 / 93

Which of the following describes the operation of a RADIUS server in WPA2 Enterprise mode?

64 / 93

Which of the following best describes a Denial-of-Service (DoS) attack on an RFID system?

65 / 93

What is a main benefit of using IPsec’s Tunnel mode over Transport mode?

66 / 93

What is meant by ’True Positive’ in the context of Intrusion Detection Systems (IDS)?

67 / 93

Where should sensors be installed if you want to monitor all attacks on your network?

68 / 93

What is a common method used by attackers to degrade the performance of a wireless network?

69 / 93

What is the primary purpose of a honeypot in a live network?

70 / 93

What is unique about using the PSK mode with WPA2, as opposed to Enterprise mode?

71 / 93

What is the function of the Authentication Header (AH) in IPsec?

72 / 93

What is a key requirement for conducting a sniffing or eavesdropping attack on an RFID system?

73 / 93

Which of the following best describes a ’false negative’ in the context of an Intrusion Detection System (IDS)?

74 / 93

What is a key advantage of the site-to-site VPN model as compared to a traditional remote access VPN?

75 / 93

How does the Challenge Handshake Authentication Protocol (CHAP) maintain security during authentication as compared to Password Authentication Protocol (PAP)?

76 / 93

What is a primary indication of a Near Field Communication (NFC) attack?

77 / 93

What is the difference between a split tunnel and a full tunnel in the context of a VPN?

78 / 93

Which version of an NAC agent is mistakenly referred to as an ’agentless’ capability by some NAC vendors according to the text?

79 / 93

What is Bluejacking in the context of Bluetooth device attacks?

80 / 93

Which of the following statements about PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol) is correct?

81 / 93

Why is it a good practice to change the default SSID of an Access Point (AP)?

82 / 93

What is the main vulnerability of WEP protocol that makes it easy to crack?

83 / 93

What are the limitations of a Network-based Intrusion Detection System (NIDS)?

84 / 93

What is a primary security concern when using direct access VPNs over a public network?

85 / 93

Where does the traffic pass through for a host-based intrusion detection system (HIDS) to monitor?

86 / 93

What is the primary purpose of MAC cloning in a security context?

87 / 93

What type of acknowledgment does a captive portal typically ask for when offering free Internet access?

88 / 93

What is the difference between wireless routers and wireless access points (APs) according to the CompTIA Security+ exam study material?

89 / 93

Which of the following tunneling protocols encrypts VPN traffic using TLS over port 443?

90 / 93

What is the main purpose of RADIUS Federation in 802.1X servers?

91 / 93

What does a healthy Network Access Control (NAC) client typically require?

92 / 93

What is the official default port for a RADIUS server in the context of WPA2 Enterprise mode?

93 / 93

What is the purpose of a Wi-Fi analyzer in a site survey?

Your score is

Dowload the FREE OFFLINE Version of this Test Bank

Boost your cybersecurity skills! Click to download the CompTIA Security+ Practice Anki deck.

Anki deck of CompTIA A+ Practice Questions images

Boost your IT skills with our free CompTIA Security+ practice test focusing on Chapter 04: Securing Your Network. Whether you’re entering the IT industry or advancing in cyber security, our resources are here to help you succeed in the CompTIA Exam.

Why Choose Our CompTIA Security+ Practice Test?

  • Skill Enhancement: Covers essential network security techniques crucial for the CompTIA Exam.
  • Career Advancement: Passing the CompTIA Security+ exam can open doors to new job opportunities and significant career changes in the IT industry.
  • Vulnerability Management: Master the art of securing networks, a key skill in cyber security.

Free Anki Deck Download

Download our free Anki Deck, reviewed by industry expert Josh Madakor, who has extensive experience in IT and cyber security, including work with Microsoft and government sectors. Learn more about Anki on the official site.

Get Started with Your IT Career Change Today!

Visit the CompTIA Security+ official site and the CompTIA Network+ official site for more information.

 

Explore our other free practice tests:
Share the Post:

Related Posts

RSS  
  • Switching to IT or Cyber Security from Another Career
    Are you thinking about changing your career to IT or cyber security but worried about losing your current high salary? If yes, this guide is crafted just for you, especially if you have a family to support and don’t want to take a big pay cut. Understanding the Challenge A person reached out with a […]
  • How to Succeed in CySA+ Exam with Free Practice Questions
    Hey there! Are you getting ready for your CompTIA CySA+ exam? I’ve got great news for you! My team and I have created over a thousand practice questions to help you prepare, and they are all free! Keep reading to find out how these questions can help you pass with flying colors. What’s Available? **100% […]
  • From Call Center to IT Architect: Taylor’s Incredible Journey
    Introduction Today, we are going to share an amazing story about Taylor, who dramatically changed her career path from working in call centers to becoming an IT architect specialist. This journey is not just inspiring but also filled with practical tips and advice for anyone dreaming of making a big move in their career, especially […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!