BR0-003 CompTIA A+ 2009 Edition Bridge Practice Exam Set 2

How will you identify that the PC has successfully completed its Power On Self Test (POST)?


Options are :

  • The PC gives two beeps at the startup. .
  • he PC gives the message "Press DEL to enter the Setup"
  • The PC gives a single beep at the startup. (Correct)
  • . The PC give frequent beeps and gives a display on the monitor. . T

Answer : The PC gives a single beep at the startup.

Which of the following attacks are computer threats that try to exploit computer applicationvulnerabilities that are unknown to others or undisclosed to the software developer?



Options are :

  • Spoofing
  • FMS
  • Buffer overflow
  • Zero-day (Correct)

Answer : Zero-day

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

ESA stands for Enterprise Security Architecture. What is the purpose of ESA?



Options are :

  • To apply network architecture paradigms to network security. (Correct)
  • To provide a framework for securing web applications.
  • To provide a framework for evaluating vulnerabilities.
  • To apply financial security concepts to network security.

Answer : To apply network architecture paradigms to network security.

Cloud computing is best described as which of the following?



Options are :

  • Distributed load balanced servers (Correct)
  • Large scale distributed computing
  • Distributed virtualized servers
  • Delivering software as a service

Answer : Distributed load balanced servers

Which of the following statements best describe the role of a programmer in an organization?Each correct answer represents a part of the solution. Choose two.

A. He writes, tests, debugs, and maintains the detailed instructions in computer programs.

B. He monitors and improves database performance and capacity.

C. He plans, co-ordinates and implements security measures for safety of the database.

D. He conceives, designs, and tests logical structures in order to solve computer problems.



Options are :

  • A,B (Correct)
  • B,C
  • C,D
  • D,.A

Answer : A,B

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

Which of the following solutions best accomplishes storage integration? 




Options are :

  • Virtualization
  • Cloud computing
  • Raid 5
  • Co-location (Correct)

Answer : Co-location

Which of the following are types of social engineering attacks?Each correct answer represents a complete solution. Choose two.A. An unauthorized person gains entrance to the building where the company's database serverresides and accesses the server by pretending to be an employee.B. An unauthorized person modifies packet headers by using someone else's IP address to hidehis identity.C. An unauthorized person calls a user and pretends to be a system administrator in order to getthe user's password.D. An unauthorized person inserts an intermediary software or program between twocommunicating hosts to listen to and modify the communication packets passing between the two

hosts.


Options are :

  • A,D
  • A,C (Correct)
  • B,C
  • B,D

Answer : A,C

Mark wants to compress spreadsheets and PNG image files by using lossless data compressionso that he can successfully recover original data whenever required. Which of the followingcompression techniques will Mark use?Each correct answer represents a complete solution. Choose two.

A. Vector quantization

B. Deflation

C. Adaptive dictionary algorithm

D. Color reduction



Options are :

  • A,B (Correct)
  • D,A
  • B,C
  • C,D

Answer : A,B

JK0-802 CompTIA A+ Certification Exam Set 10

Mark works as a Network Security Administrator for a public school. He has decided that a hot siteis appropriate for the schools grade servers, so they can have 1005= uptime, even in the event ofa major disaster. Was this appropriate?



Options are :

  • No, a school needs do not require a hot site. (Correct)
  • No, a hot site is usually not required by most organizations.
  • Yes, a hot site is always a good idea.
  • Yes, a hot site is required for the school

Answer : No, a school needs do not require a hot site.

Cloud computing is best described as which of the following?



Options are :

  • Distributed virtualized servers
  • Delivering software as a service (Correct)
  • Distributed load balanced servers

Answer : Delivering software as a service

Which of the following statements are true about Mean Time to Repair (MTTR)? Each correctanswer represents a complete solution. Choose three.

A. It is the total corrective maintenance time divided by the total number of corrective maintenance

actions during a given period of time.

B. It is the average time taken to repair a Configuration Item or IT Service after a failure.

C. It represents the average time required to repair a failed component or device.

D. It includes lead time for parts not readily available or other Administrative or Logistic Downtime

(ALDT).



Options are :

  • A,B,D
  • B,C,D
  • C,D,A
  • A,B,C (Correct)

Answer : A,B,C

SK0-004 CompTIA Server+ Certification Practice Exam Set 2

Which of the following counters measures the rate at which the bytes are sent through or receivedby a network?



Options are :

  • Network Interface: Output Queue Length
  • Network Interface: Bytes/sec (Correct)
  • Network Interface: Bytes Sent/sec
  • Network Interface: Bytes Received/sec

Answer : Network Interface: Bytes/sec

Which of the following Web sites provides a virtual community where people with a shared interestcan communicate and also can post their thoughts, ideas, and anything else and share it with theirfriends?



Options are :

  • E-commerce site
  • Social networking site (Correct)
  • Blog

Answer : Social networking site

SCADA stands for supervisory control and data acquisition. Which of the following statements aretrue about SCADA? Each correct answer represents a complete solution. Choose all that apply.

A. SCADA systems also records and logs all events into a file stored on a hard disk.

B. SCADA systems include only software components.

C. SCADA is a category of software application program for process control, the gathering of data

in real time from remote locations in order to control equipment and conditions.

D. SCADA is used in power plants as well as in oil and gas refining, telecommunications,

transportation, and water and waste control.




Options are :

  • C,D,A (Correct)
  • B,C,D
  • A,B,D
  • A,B,C

Answer : C,D,A

N10-006 CompTIA Network+ Certification Practice Test Set 7

Denish works as a Security Administrator for a United States defense contractor. He wants toensure that all systems have appropriate security precautions, based on their total score. Which ofthe following standards should he refer to?



Options are :

  • CIA
  • OVAL
  • DIACAP (Correct)
  • OWASP

Answer : DIACAP

Angela is trying to ascertain the types of security hardware and software her client shouldimplement. What should she do before deciding?



Options are :

  • Assess the technical skill of that businesses employees.
  • Assess that businesses specific opportunities.
  • Assess that businesses specific risks and threats. (Correct)
  • Assess the technical skill of management.

Answer : Assess that businesses specific risks and threats.

You are completing the requirements for vendor selection and need to create a procurement formthat will ask the vendor to provide only a price for commercial-off-the-shelf solution. What type ofprocurement form will you need to provide to the vendor?



Options are :

  • Request for proposal
  • Purchase order
  • Request for information
  • Request for quote (Correct)

Answer : Request for quote

CompTIA A+ 220 901

Juan is responsible for IT security at an insurance firm. He has several severs that are going to beretired. Which of the following is NOT one of the steps in decommissioning equipment?



Options are :

  • Review (Correct)
  • Communicate
  • Plan
  • Follow through

Answer : Review

What of the following statements is true about voice VLAN?



Options are :

  • It is used to separate VPN traffic from voice traffic.
  • It is used to separate common user data traffic from voice traffic. (Correct)
  • It is used to separate common user data traffic from TCP traffic.
  • It is used to separate common user data traffic from HTTP traffic.

Answer : It is used to separate common user data traffic from voice traffic.

Minimum security controls can only be determined after___________.




Options are :

  • System security policies are put in place.
  • The aggregate CIA score has been computed. (Correct)
  • A penetration test.
  • A vulnerability assessment.

Answer : The aggregate CIA score has been computed.

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 4

Mary is responsible for getting rid of old hard drives that are no longer used. It is important that alldata be removed from the drive and none recoverable, but that the drive still be useable. Which ofthe following steps should she take before disposing of the drives?



Options are :

  • Delete all data and defragment the drive.
  • Use a utility like Linux DD to overwrite all drive bits with zero's (Correct)
  • Delete all data and do a high-level format of the drive.
  • Degauss the drive

Answer : Use a utility like Linux DD to overwrite all drive bits with zero's

Mark works as a Network Security Administrator for uCertify Inc. Mark has been assigned to a taskto test the network security of the company. He created a webpage to discuss the progress of thetests with employees who were interested in following the test. Visitors were allowed to click on acompany's icon to mark the progress of the test. Mark successfully embeds a keylogger. He alsoadded some statistics on the webpage. The firewall protects the network well and allows strictInternet access. How was security compromised and how did the firewall respond?



Options are :

  • The attack was social engineering and the firewall did not detect it.
  • Security was not compromised as the webpage was hosted internally. (Correct)
  • Security was compromised as keylogger is invisible for firewall.
  • The attack was Cross Site Scripting and the firewall blocked it.

Answer : Security was not compromised as the webpage was hosted internally.

Which of the following statements are true about Security Requirements Traceability Matrix(SRTM)? Each correct answer represents a complete solution. Choose two.

A. It consists of various security practices that are grouped under seven phases.

B. It is a software development security assurance process proposed by Microsoft.

C. It allows requirements and tests to be easily traced back to one another.

D. It provides documentation and easy presentation of what is necessary for the security of a

system.



Options are :

  • A,D
  • C,D (Correct)
  • A,B

Answer : C,D

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 7

Mark, a malicious hacker, submits Cross-Site Scripting (XSS) exploit code to the Website of theInternet forum for online discussion. When a user visits the infected Web page, the code getsautomatically executed and Mark can easily perform acts such as account hijacking, history theft,etc. Which of the following types of cross-site scripting attacks does Mark intend to perform?




Options are :

  • Document Object Model (DOMJ
  • Persistent (Correct)
  • SAX
  • Non-persistent

Answer : Persistent

__________ is the concept that disclosure of the long-term secret keying material that is used toderive an agreed key does not compromise the secrecy of agreed keys that had previously beengenerated.





Options are :

  • Perfect forward secrecy (Correct)
  • Key exchange protocol
  • Diffie-Hellman
  • Authentication protocol

Answer : Perfect forward secrecy

Which of the following is a version of netcat with integrated transport encryption capabilities?



Options are :

  • Encat
  • Nikto
  • Socat
  • Cryptcat (Correct)

Answer : Cryptcat

CompTIA Security+ SY0-501 Questions & Answers Set 3

As a network administrator, if you are experiencing intermittent security issues what is the firstthing you should do?



Options are :

  • Try obvious fixes
  • Consider alternative solutions
  • Isolate the problem (Correct)
  • Define a solution

Answer : Isolate the problem

How many volts does the Pentium 4 processor use?


Options are :

  • . 3.3v
  • . 1.7v . (Correct)
  • 1.75v
  • 5v

Answer : . 1.7v .

Mark, a malicious hacker, submits Cross-Site Scripting (XSS) exploit code to the Website of theInternet forum for online discussion. When a user visits the infected Web page, the code getsautomatically executed and Mark can easily perform acts such as account hijacking, history theft,etc. Which of the following types of cross-site scripting attacks does Mark intend to perform?



Options are :

  • SAX
  • Non-persistent
  • Persistent (Correct)
  • Document Object Model (DOMJ

Answer : Persistent

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 6

Which of the following are languages used to communicate with a printer?Each correct answer represents a complete solution. Choose three.A. SSLB. PostScriptC. Windows GDID. PCL


Options are :

  • A,B,C
  • A,C,D
  • B,C,D (Correct)
  • C,D,A

Answer : B,C,D

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions