CA1-001 CompTIA Advanced Security Practitioner Practice Exam Set 1

which of the following is the randomness collected by an operating system or application for use incryptography or other uses that require random data?

Options are :

  • Confusion
  • Entropy
  • Digital signature
  • Diffusion

Answer : Entropy

CompTIA CA1-001 Advanced Security Practitioner Practice Exam Set 5

Mark works as a Network Security Administrator for uCertify Inc. The organization is using anintranet to distribute information to its employees. A database residing on the network containsemployees' information, such as employee name, designation, department, phone extension, dateof birth, date of joining, etc. He is concerned about the security because the database has allinformation about employees, which can help an unauthorized person to recognize an individual.Which Personally Identifiable Information should be removed from the database so that theunauthorized person cannot identify an individual?

Options are :

  • Employee name
  • Date of joining
  • Employee code
  • Date of birth

Answer : Date of birth

Which of the following statements best describe the advantages of Simple Object Access Protocol(SOAP): Each correct answer represents a complete solution. Choose three.

A. It is versatile enough to allow for the use of different transport protocols.

B. It is simple and extensible.

C. It allows easier communication through proxies and firewalls than previous remote execution


D. It is language and platform dependent.

Options are :

  • B,C,D
  • A,B,C
  • C,D,A
  • A,B,D

Answer : A,B,C

Which of the following is a written document and is used in those cases where parties do not implya legal commitment or in those situations where the parties are unable to create a legallyenforceable agreement?

Options are :

  • Patent law
  • Certification and Accreditation (COA or CnA)
  • Memorandum of understanding (MOU)
  • Memorandum of agreement (MOA)

Answer : Memorandum of understanding (MOU)

220-702 CompTIA A+ Practical Application Practice Exam Set 6

Which of the following is the best description of vulnerability assessment?

Options are :

  • Determining the likelihood of a given threat being exploited.
  • Determining what threats exist to your network.
  • Determining the weaknesses in your network that would allow a threat to be exploited
  • Determining the impact to your network if a threat is exploited.

Answer : Determining the weaknesses in your network that would allow a threat to be exploited

Risk assessment helps in determining the extent of potential threats and risks associated with anIT system throughout its SDLC. Which of the following steps covered by the risk assessmentmethodology?Each correct answer represents a complete solution. Choose three.

A. Vulnerability Identification

B. Cost Analysis

C. Threat Identification

D. System Characterization

Options are :

  • A,C,D
  • B,C,D
  • A,B,C
  • B,C,D

Answer : A,C,D

You have considered the security of the mobile devices on your corporate network from virusesand malware. Now, you need to plan for remotely enforcing policies for device management andsecurity, which of the following things are includes in the configuration management of mobiledevices?Each correct answer represents a part of the solution. Choose three.

A. Controlling the apps deployed on devices

B. Managing the OS version of devices

C. Supporting other preferred corporate policy

D. Managing application and security patches

Options are :

  • A,B
  • C,D
  • B,D
  • B,C

Answer : B,D

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 12

Which of the following statements are true about capability-based security?

Options are :

  • It is a concept in the design of secure computing systems, one of the existing security models.
  • It is a computer security model based on the Actor model of computation.
  • It is a concept in the design of secure computing systems.
  • It is a scheme used by some computers to control access to memory.

Answer : It is a concept in the design of secure computing systems.

An organization s network uses public keys for message encryption. Which of the followingmanages security credentials in the network and issues certificates to confirm the identity andother attributes of a certificate in relation to other entities?

Options are :

  • Certificate Revocation List
  • Online Certificate Status Protocol
  • Public Key Infrastructure
  • Certificate Authority

Answer : Certificate Authority

Allen needs a program that injects automatically semi-random data into a program or stacks anddetects bugs. What will he use?

Options are :

  • Fuzzer
  • Happy path
  • Agile testing
  • Boundary value analysis

Answer : Fuzzer

CompTIA Network+ (N10-007)

_____________applies enterprise architecture concepts and practices in the information securitydomain.

Options are :

  • ESA
  • OVAL
  • AAR

Answer : ESA

Which of the following is a set of interactive telecommunication technologies which allow two ormore locations to interact via two-way video and audio transmissions simultaneously?

Options are :

  • Video conferencing
  • Instant messaging
  • Electronic mail
  • Audio conferencing

Answer : Video conferencing

Which of the following is a flexible set of design principles used during tine phases of systemsdevelopment and integration?

Options are :

  • Service-oriented architecture (SOA)
  • Service-oriented modeling and architecture (SOMA)
  • Sherwood Applied Business Security Architecture (SABSA)
  • Service-oriented modeling framework (SOMF)

Answer : Service-oriented architecture (SOA)

CA1-001 CompTIA Advanced Security Practitioner Practice Exam Set 1

Which of the following statements are true about Fibre Channel over Ethernet (FCoE)?Each correct answer represents a complete solution. Choose three.

A. It replaces the FCO and FC1 layers of the Fibre Channel stack with Ethernet.

B. It is an encapsulation of Fibre Channel frames over Ethernet networks.

C. It allows Fibre Channel to use 10 Gigabit Ethernet networks while preserving the Fibre Channel


D. It maps Fibre Channel over selected half duplex IEEE 802.3.

Options are :

  • A,B,C
  • C,D,A
  • A,B,D
  • B,C,D

Answer : A,B,C

Which is the process of comparing the business processes and performance metrics includingcost, cycle time, productivity, or quality?

Options are :

  • Benchmarking
  • Agreement
  • Service Improvement Plan

Answer : Benchmarking

A user has entered a user name and password at the beginning of the session, and accessesmultiple applications. He does not need to re-authenticate for accessing each application. Whichof the following authentication processes is he using?

Options are :

  • File authentication
  • Mutual authentication
  • SSO authentication
  • Biometric authentication

Answer : SSO authentication

CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 3

Which of the following is the capability to correct flows in the existing functionality without affectingother components of the system?

Options are :

  • Availability
  • Maintainability
  • Manageability
  • Reliability

Answer : Maintainability

Which of the following is an approximate of the average or mean time until a component's firstfailure or disruption in the operation of the product, process, procedure, or design takes place?

Options are :

  • MTF
  • MSDS
  • HMA
  • MTBF

Answer : MTF

Which of the following is a structured review process to analyze what happened, why it happened,and how it can be done better, by the participants and those responsible for the project or event?

Options are :

  • After action summary
  • After action review
  • After action analysis
  • After action report

Answer : After action review

CompTIA JK0-022 E2C Security Data & Host Security Exam Set 1

Which of the following federal regulations requires federal agencies to be able to monitor activity ina "meaningful and actionable way"?

Options are :

  • Sarbanes-Oxley

Answer : FISMA

Which of the following are the purposes of the Cost-benefit analysis process? Each correct answerrepresents a complete solution. Choose two.

A. To determine if an investment is sound

B. To describe the future value on the investment of the project

C. To see how it compares with alternate projects

D. To support benefit management, measurement, and reporting

Options are :

  • A,B
  • C,D
  • B,C
  • A,C

Answer : A,C

Which of the following helps an employee to access his corporation's network while traveling?

Options are :

  • Remote Assistance
  • Task Manager
  • Remote access
  • Computer management

Answer : Remote access

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 1

Which of the following types of Incident Response Teams (IRT) is responsible for a logical orphysical segment of the infrastructure, usually of a large organization or one that is geographicallydispersed?

Options are :

  • Coordinating IRT
  • Outsourced IRT
  • Distributed IRT
  • Central IRT

Answer : Distributed IRT

Which of the following statements are true about prototypes?Each correct answer represents a complete solution. Choose three.

A. It reduces initial project risks within a business organization.

B. It reduces the closeness between what a developer has defined for application architecture and

what business management has understood.

C. It confirms technology recommendations for an application.

D. It helps verify some of the application requirements that are not dearly defined by a user.

Options are :

  • B,C,D
  • C,D,A
  • A,B,D
  • A,B,C

Answer : C,D,A

___________is defined as maintaining ongoing awareness of information.

Options are :

  • Intrusion detection
  • Vulnerability assessment
  • Continuous Monitoring
  • Security Awareness

Answer : Continuous Monitoring

CompTIA IT Fundamentals (Exam FC0-U61) Practice Tests Set 2

Juan is trying to perform a risk analysis of his network. He has chosen to use OCTAVE. What isOCTAVE primarily used for?

Options are :

  • A comprehensive risk assessment model
  • A language for vulnerability assessment
  • An impact analysis tool
  • A threat assessment tool

Answer : A comprehensive risk assessment model

Which of the following standard organizations promulgates worldwide proprietary industrial andcommercial standards?

Options are :

  • ANSI
  • IEEE
  • W3C
  • ISO

Answer : ISO

Which of the following is a log that contains records of login/logout activity or other security-relatedevents specified by the systems audit policy?

Options are :

  • Process tracking
  • Object Manager
  • Logon event
  • Security Log

Answer : Security Log

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 3

Which of the following elements are essential elements of a privacy policy? Each correct answerrepresents a complete solution. Choose two.

Options are :

  • Availability
  • Reliability
  • Notification
  • Opt-out provision

Answer : Notification

Which of the following is used to provide for the systematic review, retention and destruction ofdocuments received or created in the course of business?

Options are :

  • Document compliance policy
  • Document retention policy
  • Document research policy
  • Document entitled policy

Answer : Document retention policy

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions