CompTIA Network + 4.1 Network Security – Security Concepts

Posted by:

|

On:

|

Security Concepts

1 / 25

What does network access control (NAC) primarily aim to do?

2 / 25

Which type of risk assessment focuses on identifying potential threats and their impact on the organization?

3 / 25

What is the primary function of a demilitarized zone (DMZ) in network security?

4 / 25

What is a common internal threat to network security?

5 / 25

Which type of attack exploits a vulnerability on the same day that it is discovered and before a fix is released?

6 / 25

Which authentication protocol is commonly used to provide secure access to network resources using a central server?

7 / 25

What is the main function of TACACS+ in network security?

8 / 25

Which authentication method involves the use of multiple forms of verification?

9 / 25

In the context of the CIA triad, which concept ensures that sensitive information is not accessed by unauthorized individuals?

10 / 25

Which access control method assigns permissions to users based on their roles within an organization?

11 / 25

Which protocol provides secure authentication and communication over a network using tickets?

12 / 25

Which method is commonly used to ensure that users are authenticated only once and can access multiple systems without re-entering credentials?

13 / 25

Which method is used to isolate different parts of a network to enhance security?

14 / 25

What is the primary purpose of a Security Information and Event Management (SIEM) system?

15 / 25

Which of the following describes a zero-day vulnerability?

16 / 25

What is the main purpose of a vulnerability assessment in network security?

17 / 25

Which protocol is commonly used for secure communication and directory services in network authentication?

18 / 25

Which security measure involves assigning specific tasks to different individuals to reduce the risk of fraud and errors?

19 / 25

Which type of assessment evaluates the overall security posture of an organization, including policies and procedures?

20 / 25

Which of the following best describes the principle of least privilege?

21 / 25

What is the purpose of a honeypot in network security?

22 / 25

Which of the following is a method for detecting and responding to network threats in real-time?

23 / 25

What is the main objective of defense in depth?

24 / 25

Which security concept involves dividing network resources to limit the scope of access for users?

25 / 25

What does the Zero Trust security model emphasize?

Your score is

Exit