Comptia Security +: Network Access MCQs

Comptia Security +: Network Access MCQs

Our experts have gathered these Comptia Security +: Network Access MCQs through research, and we hope that you will be able to see how much knowledge base you have for the subject of Comptia Security +: Network Access by answering these 30 multiple-choice questions.
Get started now by scrolling down!

1: Authentication method that include pin - password - code words - personal information

A.   Something you know

B.   Systems

C.   Access control list

D.   Corrective

2: Dictionary - hybrid - brute force - rainbow table

A.   Detective

B.   Password attacks

C.   Common locks

D.   Physical access control issues

3: Information classification is no read up - no write down

A.   Bell La Padula

B.   Biba

C.   ACLs

D.   Brute force

4: Security controls that fix a problem or prevent further damage

A.   Dictionary

B.   Corrective

C.   Bell La Padula

D.   Preventative

5: Access control model concerned with information integrity

A.   Type II

B.   Corrective

C.   Clark Wilson

D.   Biba

6: Lists of permission associated with objects - used in the DAC model - typically include a implicit deny rule

A.   Clark Wilson

B.   Password attacks

C.   ACLs

D.   Type II

7: Password type that best defends against password attacks - i.e. tokens

A.   Are

B.   Hybrid

C.   Crossover error rate

D.   One time

8: Security controls that thwart a security breach - i.e. require user ID and password

A.   Preventative

B.   Biba

C.   Password cracking

D.   Rainbow table

9: Cognitive - dynamic - one-time - passphrase

A.   Asynchronous

B.   Password types

C.   Synchronous

D.   Subjects

10: Password length/complexity help defend against this attack

A.   Hybrid

B.   Crossover error rate

C.   Are

D.   Brute force

11: Using three or more authentication methods

A.   Multifactor

B.   Implicit deny

C.   Access control list

D.   Physical access control issues

12: Error caused by biometrics where the system accepts impostors - also know as false acceptance rate (FAR)

A.   Hybrid

B.   Subjects

C.   Biba

D.   Type II

13: Data - hardware - networks - facility are access control ________

A.   Objects

B.   Password types

C.   Brute force

D.   Bell La Padula

14: Form of physical authentication - id/smart card - atm card - token - key - passport - something you __________

A.   Crossover error rate

B.   Biba

C.   Have

D.   Objects

15: A password attack that encrypts all the words in the dictionary and compares the resulting hash values with those of the password

A.   Group policy

B.   Password cracking

C.   Dictionary

D.   4 steps of access control

16: A password attack that tries all possible combinations until the correct password is identified

A.   Type II

B.   Preventative

C.   Brute force

D.   Implicit deny

17: Form of authentication that relies on human characteristic - fingerprint - hand geometry - facial recognition - eye scan - voice print - DNA - something you _________

A.   Something you know

B.   Are

C.   Clark Wilson

D.   ACLs

18: Using any two authentication methods

A.   Something you know

B.   Systems

C.   Bell La Padula

D.   Two factor

19: Information classification is no write up - no read down

A.   Password cracking

B.   Asynchronous

C.   Common locks

D.   Biba

20: MAC - DAC - and RBAC

A.   Clark Wilson

B.   Systems

C.   Access control models

D.   Common locks

21: Token that generates a password based on challenge/response

A.   Asynchronous

B.   Authentication methods

C.   4 steps of access control

D.   Preventative

22: Preset (key in knob) - deadbolt - combination padlock - cipher

A.   Something you know

B.   Common locks

C.   Biba

D.   Physical access control issues

23: The process of recovering passwords from stored/transmitted data

A.   Password cracking

B.   Password types

C.   Have

D.   Password policy

A.   Something you know

B.   Asynchronous

C.   Brute force

D.   Detective

25: Data can only be accessed through applications - designed to prevent unauthorized modification - errors and fraud

A.   Preventative

B.   Detective

C.   Implicit deny

D.   Clark Wilson

26: Feature of an OS that allows for logical access control by grouping subjects with common characteristics

A.   Group policy

B.   4 steps of access control

C.   Password attacks

D.   Two factor

27: Access control model designed to prevent authorized access to classified information - concerned with information confidentiality

A.   Biba

B.   Two factor

C.   Bell La Padula

D.   Corrective

28: Something you know - have - are or location

A.   Clark Wilson

B.   Authentication methods

C.   CER

D.   Bell La Padula

29: ACL stands for...

A.   Multifactor

B.   Have

C.   Access control list

D.   Password policy

30: A small room with two authentication doors - after gaining access to the 1st door the subject is locked in until access to granted to the 2nd door

A.   Mantrap

B.   Type II

C.   Password cracking

D.   Physical access control issues