Home > Articles > CompTIA > Security+

  • Print
  • + Share This
This chapter is from the book

Quick Answers

Objective 3.1: Devices

  1. a, b, and d.

  2. b, c, and d.

  3. b.

Objective 3.1.1: Firewalls

  1. b.

  2. b and c.

  3. a, b, c, and d

  4. a and b.

  5. b and c.

  6. d.

  7. b.

  8. d.

  9. b.

  10. d.

Objective 3.1.2: Routers

  1. d.

  2. a.

  3. a, b, and d.

  4. a.

  5. a and d.

  6. b.

  7. b.

Objective 3.1.3: Switches

  1. b.

  2. b and d.

  3. b.

Objective 3.1.4: Wireless

  1. a.

Objective 3.1.5: Modems

  1. a and b.

  2. a.

Objective 3.1.6: RAS

  1. d.

  2. b, c, and d.

Objective 3.1.7: Telecom/PBX

  1. b and c.

  2. a and b.

Objective 3.1.8: VPN

  1. c.

  2. d.

  3. c.

  4. b and d.

Objective 3.1.9: IDS

  1. a.

  2. b.

  3. a.

Objective 3.1.10: Network Monitoring/ Diagnostic

  1. b.

  2. b.

  3. d.

Objective 3.1.11: Workstations

  1. d.

  2. c.

Objective 3.1.12: Servers

  1. d.

  2. c and d.

Objective 3.1.13: Mobile Devices

  1. b and c.

  2. c.

Objective 3.2: Media

  1. a, c, and d.

  2. c.

  3. d.

Objective 3.2.1: Coax

  1. a and b.

  2. c.

  3. b.

Objective 3.2.2: UTP/STP

  1. d.

  2. d.

  3. c.

Objective 3.2.3: Fiber

  1. b.

  2. d.

  3. a.

  4. d.

  5. d.

  6. c.

  7. a.

Objective 3.2.4: Removable Media

  1. a.

  2. a and c.

  3. c.

Objective 3.2.4.1: Tape
  1. c and d.

  2. a.

Objective 3.2.4.2: CDR
  1. d.

Objective 3.2.4.3: Hard Drives
  1. c.

  2. c.

Objective 3.2.4.4: Diskettes
  1. d.

Objective 3.2.4.5: Flashcards
  1. a.

Objective 3.2.4.6: Smartcards
  1. b.

  2. b.

Objective 3.3: Security Topologies

  1. c.

Objective 3.3.1: Security Zones

  1. a, b, c, and d.

Objective 3.3.1.1: DMZ
  1. a, c, and d.

Objective 3.3.1.2: Intranet
  1. c.

  2. a, c, and d.

Objective 3.3.1.3: Extranet
  1. c.

Objective 3.3.2: VLANs

  1. a, c, and d.

  2. b.

  3. b.

Objective 3.3.3: NAT

  1. a.

  2. c.

  3. b.

  4. a, b, and d

  5. a.

  6. d.

  7. b.

Objective 3.3.4: Tunneling

  1. a and c.

  2. b, c, and d.

Objective 3.4: Intrusion Detection

  1. b.

  2. b.

  3. c.

  4. d.

  5. b.

Objective 3.4.1: Network Based

  1. a.

  2. a and b.

  3. a.

Objective 3.4.2: Host Based

  1. d.

Objective 3.4.2.2: Active Detection
  1. b and c.

Objective 3.4.2.2: Passive Detection
  1. b and c.

Objective 3.4.3: Honey Pots

  1. d.

Objective 3.4.4: Incident Response

  1. b.

Objective 3.5: Security Baselines

  1. a.

Objective 3.5.1: OS/NOS Hardening (Concepts and Processes)

  1. b and d.

Objective 3.5.1.1: File System
  1. d.

  2. a.

  3. d.

Objective 3.5.1.2: Updates (Hotfixes, Service Packs, and Patches)
  1. b.

Objective 3.5.2: Network Hardening

  1. d.

Objective 3.5.2.1: Updates (Firmware)
  1. c.

Objective 3.5.2.2: Configuration
  1. a and b.

Objective 3.5.2.2.1: Enabling and Disabling Services and Protocols
  1. a.

  2. a.

  3. a.

Objective 3.5.2.2.2: Access Control Lists
  1. d.

Objective 3.5.3: Application Hardening

  1. c.

Objective 3.5.3.1: Updates (Hotfixes, Service Packs, and Patches)
  1. c.

Objective 3.5.3.2: Web Servers
  1. a, b, and d.

Objective 3.5.3.3: Email Servers
  1. c.

  2. a.

  3. a, c, and d.

Objective 3.5.3.4: FTP Servers
  1. d.

  2. b.

Objective 3.5.3.5: DNS Servers
  1. c.

  2. d.

Objective 3.5.3.6: NNTP Servers
  1. b.

  2. c.

Objective 3.5.3.7: File/Print Servers
  1. c.

Objective 3.5.3.8: DHCP Servers
  1. b.

  2. c.

Objective 3.5.3.9: Data Repositories
  1. a, c, and d.

Objective 3.5.3.9.1: Directory Services
  1. a.

Objective 3.5.3.9.2: Databases
  1. b.

  2. b.

  • + Share This
  • 🔖 Save To Your Account