Exam Questions and Answers (Latest
Update 2026)
Type of valid security measure to protect email from viruses -
correct answer ✅Use blockers on email gateways
What do host based intrusion detection systems often rely upon to
perform their detection activities? -
correct answer ✅Host system auditing capabilities. Host based IDS
uses the logs of the local system to search for attack or intrustion
activities.
Host based IDS does not analyze network traffic, use external
sensors, or rely upon remote monitoring tools.
Network based intrusion detection is most suited to detect and
prevent which types of attacks? -
correct answer ✅Bandwidth-based DoS
An active IDS system often performs what activities? -
correct answer ✅1) Update filters to block suspect traffic
2) Perform reverse lookups to identify an intruder
,Security+ LabSim Review Domain 1
Exam Questions and Answers (Latest
Update 2026)
Heuristics based IDS -
correct answer ✅Is able to perform some level of intelligent
statistical analysis of traffic to detect attackts
Stateful inspection -
correct answer ✅Searches for attacks by inspecting packet
contents and being able to associate one packet with another, it
looks for attacks in overall data streams rather than individual
packets
You want to implement an IDS system that uses rules or statistical
analysis to detect attacks. What should you deploy? -
correct answer ✅Anomaly (aka behavior, heuristic, or statistical)
HIDS -
correct answer ✅host-based IDS
What device accepts incoming client requests and distributes those
requests to specific servers? -
correct answer ✅Load balancer
, Security+ LabSim Review Domain 1
Exam Questions and Answers (Latest
Update 2026)
You want to increase the security of your network by allowing only
authenticated users to be able to access network devices through a
switch. What should you implement? -
correct answer ✅802.1x
What applications typically use 802.1x authentication? -
correct answer ✅1) controlling access through a wireless access
point
2) controlling access through a switch
What is the most important thing to do to prevent console access
to the router? -
correct answer ✅Keep the router in a locked room. A console
connection can only be established with a direct physical
connection to the router.
Static NAT -
correct answer ✅Maps an internal IP address to a static port
address. Usually used to take a server on a private network and
make it available on the Internet