CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 5

Corporate policy states that the systems administrator should not be present during system audits.The security policy that states this is:
Options are :
  • Least privilege.
  • Separation of duties (Correct)
  • Mandatory vacation
  • Non-disclosure agreement

Answer : Separation of duties

CompTIA Project+ (PK0-004) 5 Practice Test 2019 Set 3

A data breach occurred which impacted the HR and payroll system. It is believed that an attackfrom within the organization resulted in the data breach. Which of the following should beperformed FIRST after the data breach occurred?
Options are :
  • Restore from backup tapes
  • Review NIDS logs
  • Assess system status (Correct)
  • Conduct a business impact analysis

Answer : Assess system status

A project has been established in a large bank to develop a new secure online banking platform.Half way through the development it was discovered that a key piece of software used as part ofthe base platform is now susceptible to recently published exploits. Who should be contactedFIRST by the project team to discuss potential changes to the platform requirements?
Options are :
  • Stakeholders (Correct)
  • Human Resources
  • Facilities Manager
  • Engineers

Answer : Stakeholders

An administrator wants to virtualize the company's web servers, application servers, and databaseservers. Which of the following should be done to secure the virtual host machines? (Select TWO).A. Establish VLANs for each virtual guest's NIC on the virtual switch.B. Enable virtual switch layer 2 security precautions.C. Only access hosts through a secure management interface.D. Distribute guests to hosts by application role or trust zone.E. Restrict physical and network access to the host console
Options are :
  • C,B
  • B,E
  • C,A
  • C,E (Correct)

Answer : C,E

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

Employees have recently requested remote access to corporate email and shared drives. Remoteaccess has never been offered; however, the need to improve productivity and rapidly respondingto customer demands means staff now requires remote access. Which of the following controls willBEST protect the corporate network?
Options are :
  • Develop a security policy that defines remote access requirements. Perform regular audits of user accounts and reviews of system logs.
  • Plan and develop security policies based on the assumption that external environments have active hostile threats. (Correct)
  • Implement a DLP program to log data accessed by users connecting via remote access. Regularly perform user revalidation.
  • Secure remote access systems to ensure shared drives are read only and access is provided through a SSL portal. Perform regular audits of user accounts and reviews of system logs.

Answer : Plan and develop security policies based on the assumption that external environments have active hostile threats.

After a security incident, an administrator revokes the SSL certificate for their web serverwww.company.com. Later, users begin to inform the help desk that a few other servers aregenerating certificate errors: ftp.company.com, mail.company.com, and partners.company.com.Which of the following is MOST likely the reason for this?
Options are :
  • Each of the servers used the same EV certificate.
  • Revoking a certificate can only be done at the domain level.
  • The web server was the CA for the domain.
  • The servers used a wildcard certificate (Correct)

Answer : The servers used a wildcard certificate

The Chief Information Security Officer (CISO) is researching ways to reduce the risk associatedwith administrative access of six IT staff members while enforcing separation of duties. In the casewhere an IT staff member is absent, each staff member should be able to perform all thenecessary duties of their IT co-workers. Which of the following policies should the CISO implementto reduce the risk?
Options are :
  • Require role-based security on primary role, and only provide access to secondary roles on a case-by-case basis. (Correct)
  • Require the use of an unprivileged account, and a second shared account only for administrative purposes
  • Require separation of duties ensuring no single administrator has access to all systems.
  • Require on-going auditing of administrative activities, and evaluate against risk-based metrics.

Answer : Require role-based security on primary role, and only provide access to secondary roles on a case-by-case basis.

CompTIA Security+ SY0 401 Test Set 1

The IT department of a large telecommunications company has developed and finalized a set ofsecurity solutions and policies which have been approved by upper management for deploymentwithin the company. During the development of the security solutions and policies, the FIRST thingthe IT department should have done was:
Options are :
  • contact vendor management so the RFI and RFP process can be started as soon as possible
  • involve facilities management early in the project so they can plan for the new security hardware in the data center.
  • contact an independent consultant who can tell them what policies and solutions they need.
  • discuss requirements with stakeholders from the various internal departments. (Correct)

Answer : discuss requirements with stakeholders from the various internal departments.

An employee of a company files a complaint with a security administrator. While sniffing networktraffic, the employee discovers that financially confidential emails were passing between twowarehouse users. The two users deny sending confidential emails to each other. Which of thefollowing security practices would allow for non-repudiation and prevent network sniffers fromreading the confidential mail? (Select TWO).A. Transport encryptionB. Authentication hashingC. Digital signatureD. Legal mail holdE. TSIG code signing
Options are :
  • A,D
  • A,B
  • A,C (Correct)
  • D,C

Answer : A,C

A technician states that workstations that are on the network in location B are unable to validatecertificates, while workstations that are on the main location Aís network are having no issues.Which of the following methods allows a certificate to be validated by a single server that returnsthe validity of that certificate?
Options are :
  • ACL
  • XACML
  • CRL
  • OCSP (Correct)

Answer : OCSP

SY0-401 CompTIA Security+ Certification Practice Exam Set 2

The sales division within a large organization purchased touch screen tablet computers for all 250sales representatives in an effort to showcase the use of technology to its customers and increaseproductivity. This includes the development of a new product tracking application that works withthe new platform. The security manager attempted to stop the deployment because the equipmentand application are non-standard and unsupported within the organization. However, uppermanagement decided to continue the deployment. Which of the following provides the BESTmethod for evaluating the potential threats?
Options are :
  • Benchmark other organizationís that already encountered this type of situation and apply all relevant learningís and industry best practices.
  • Develop a standard image for the new devices and migrate to a web application to eliminate locally resident data.
  • Conduct a vulnerability assessment to determine the security posture of the new devices and the application.
  • Work with the business to understand and classify the risk associated with the full lifecycle of the hardware and software deployment. (Correct)

Answer : Work with the business to understand and classify the risk associated with the full lifecycle of the hardware and software deployment.

An organization recently upgraded its wireless infrastructure to support WPA2 and requires allclients to use this method. After the upgrade, several critical wireless clients fail to connectbecause they are only WEP compliant. For the foreseeable future, none of the affected clientshave an upgrade path to put them into compliance with the WPA2 requirement. Which of thefollowing provides the MOST secure method of integrating the non-compliant clients into thenetwork?
Options are :
  • Create a separate SSID and require the legacy clients to connect to the wireless network using certificate-based 802.1x.
  • Create a separate SSID and require the use of dynamic WEP keys.
  • Create a separate SSID and WEP key to support the legacy clients and enable detection of rogue APs.
  • Create a separate SSID and WEP key on a new network segment and only allow required communication paths. (Correct)

Answer : Create a separate SSID and WEP key on a new network segment and only allow required communication paths.

The Chief Executive Officer (CEO) has asked a security project manager to providerecommendations on the breakout of tasks for the development of a new product. The CEO thinksthat by assigning areas of work appropriately the overall security of the product will be increased,because staff will focus on their areas of expertise. Given the below groups and tasks select theBEST list of assignments.Groups: Networks, Development, Project Management, Security, Systems Engineering, TestingTasks: Decomposing requirements, Secure coding standards, Code stability, Functional validation,Stakeholder engagement, Secure transport
Options are :
  • Systems Engineering. Functional validation Development: Stakeholder engagement Testing. Code stability Project Management: Decomposing requirements Security: Secure coding standards Networks: Secure transport
  • Systems Engineering. Decomposing requirements Development: Stakeholder engagement Testing. Code stability Project Management: Functional validation Security: Secure coding standards Networks: Secure transport
  • Systems Engineering. Decomposing requirements Development: Code stability Testing. Functional validation Project Management: Stakeholder engagement Security: Secure coding standards Networks: Secure transport (Correct)
  • Systems Engineering. Decomposing requirements Development: Secure coding standards Testing. Code stability Project Management: Stakeholder engagement Security: Secure transport Networks: Functional validation

Answer : Systems Engineering. Decomposing requirements Development: Code stability Testing. Functional validation Project Management: Stakeholder engagement Security: Secure coding standards Networks: Secure transport

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

A system designer needs to factor in CIA requirements for a new SAN. Which of the CIArequirements is BEST met by multipathing?
Options are :
  • Integrity
  • Availability (Correct)
  • Confidentiality
  • Authentication

Answer : Availability

An administrator is assessing the potential risk impact on an accounting system and categorizes itas follows:Administrative Files = {(Confidentiality, Moderate), (Integrity, Moderate), (Availability, Low)}Vendor Information = {(Confidentiality, Moderate), (Integrity, Low), (Availability, Low)}Payroll Data = {(Confidentiality, High), (Integrity, Moderate), (Availability, Low)}Which of the following is the aggregate risk impact on the accounting system?
Options are :
  • {(Confidentiality, Moderate), (Integrity, Moderate), (Availability, Moderate)}
  • {(Confidentiality, Moderate), (Integrity, Moderate), (Availability, Low)}
  • {(Confidentiality, High), (Integrity, Low), (Availability, Low)}
  • {(Confidentiality, High), (Integrity, Moderate), (Availability, Low)} (Correct)

Answer : {(Confidentiality, High), (Integrity, Moderate), (Availability, Low)}

A systems security consultant is hired by Corporation X to analyze the current enterprise networkenvironment and make recommendations for increasing network security. It is the consultantís firstday on the job. Which of the following network design considerations should the consultantconsider? (Select THREE).A. What hardware and software would work best for securing the network?B. What corporate assets need to be protected?C. What are the business needs of the organization?D. What outside threats are most likely to compromise network security?E. What is the budget for this project?F. What time and resources are needed to carry out the security plan?
Options are :
  • F,C,D
  • B,E,D
  • B,C,D (Correct)
  • B,C,A

Answer : B,C,D

SY0-401 CompTIA Security+ Certification Practice Exam Set 6

Virtual hosts with different security requirements should be:
Options are :
  • moved to the cloud.
  • scanned for vulnerabilities regularly.
  • stored on separate physical hosts. (Correct)
  • encrypted with a one-time password

Answer : stored on separate physical hosts.

The company is considering issuing non-standard tablet computers to executive management.Which of the following is the FIRST step the security manager should perform?
Options are :
  • Set up an access control system to isolate the devices from the network.
  • Apply standard security policy settings to the devices.
  • Develop the use case for the devices and perform a risk analysis. (Correct)
  • Integrate the tablets into standard remote access systems.

Answer : Develop the use case for the devices and perform a risk analysis.

Which of the following activities could reduce the security benefits of mandatory vacations?
Options are :
  • Have a replacement employee run the same applications as the vacationing employee
  • Have a replacement employee perform tasks in a different order from the vacationing employee
  • Have a replacement employee run several daily scripts developed by the vacationing employee. (Correct)
  • Have a replacement employee perform the job from a different workstation than the vacationing employee.

Answer : Have a replacement employee run several daily scripts developed by the vacationing employee.

CompTIA JK0-022 Security Cryptography Certification Exam Set 6

A wholesaler has decided to increase revenue streams by selling direct to the public through anon-line system. Initially this will be run as a short term trial and if profitable, will be expanded andform part of the day to day business. The risk manager has raised two main business risks for theinitial trial:1. IT staff has no experience with establishing and managing secure on-line credit cardprocessing.2. An internal credit card processing system will expose the business to additional compliancerequirements.Which of the following is the BEST risk mitigation strategy?
Options are :
  • Transfer the risks to another internal department, who have more resources to accept the risk.
  • Transfer the initial risks by outsourcing payment processing to a third party service provider (Correct)
  • Accept the risks and log acceptance in the risk register. Once the risks have been accepted close them out.
  • Mitigate the risks by hiring additional IT staff with the appropriate experience and certifications.

Answer : Transfer the initial risks by outsourcing payment processing to a third party service provider

A web administrator develops a web form for users to respond to the company via a web page.Which of the following should be practiced to avoid a security risk?
Options are :
  • Input validation (Correct)
  • SQL injection
  • Click jacking
  • XSS scripting

Answer : Input validation

A large enterprise is expanding through the acquisition of a second corporation. Which of thefollowing should be undertaken FIRST before connecting the networks of the newly formed entity?
Options are :
  • Implement a firewall/DMZ system between the networks.
  • Develop a risk analysis for the merged networks. (Correct)
  • A system and network scan to determine if all of the systems are secure.
  • Conduct a complete review of the security posture of the acquired corporation.

Answer : Develop a risk analysis for the merged networks.

CompTIA Project+ (PK0-004) 5 Practice Test 2019 Set 3

A replacement CRM has had its business case approved. In preparation for a requirementsworkshop, an architect is working with a business analyst to ensure that appropriate securityrequirements have been captured. Which of the following documents BEST captures the securityrequirements?
Options are :
  • Business requirements document (Correct)
  • Solution overview document
  • Use case and viewpoints document
  • Requirements traceability matrix document

Answer : Business requirements document

The Chief Executive Officer (CEO) of a corporation purchased the latest mobile device and wantsto connect it to the companyís internal network. The Chief Information Security Officer (CISO) wastold to research and recommend how to secure this device.Which of the following recommendations should be implemented to keep the device from posing asecurity risk to the company?
Options are :
  • A corporate policy to prevent sensitive information from residing on a mobile device and antivirus software.
  • Encryption of the non-volatile memory and a corporate policy to prevent sensitive information from residing on a mobile device.
  • Encryption of the non-volatile memory and a password or PIN to access the device. (Correct)
  • A password or PIN to access the device and a corporate policy to prevent sensitive information from residing on a mobile device.

Answer : Encryption of the non-volatile memory and a password or PIN to access the device.

When Company A and Company B merged, the network security administrator for Company Awas tasked with joining the two networks. Which of the following should be done FIRST?
Options are :
  • Conduct a penetration test of Company Bís network.
  • Perform a peer code review on Company Bís application.
  • Implement a unified IPv6 addressing scheme on the entire network.
  • Perform a vulnerability assessment on Company Bís network. (Correct)

Answer : Perform a vulnerability assessment on Company Bís network.

SY0-401 CompTIA Security+ Certification Practice Exam Set 8

A new project initiative involves replacing a legacy core HR system, and is expected to touchmany major operational systems in the company. A security administrator is engaged in theproject to provide security consulting advice. In addition, there are database, network, application,HR, and transformation management consultants engaged on the project as well. Theadministrator has established the security requirements. Which of the following is the NEXT logicalstep?
Options are :
  • Communicate the security requirements with all stakeholders for discussion and buy-in. (Correct)
  • Document the security requirements in an email and move on to the next most urgent task.
  • Organize for a requirements workshop with the technical project members, being the database, network, and application consultants.
  • Organize for a requirements workshop with the non-technical project members, being the HR and transformation management consultants.

Answer : Communicate the security requirements with all stakeholders for discussion and buy-in.

An internal employee has sold a copy of the production customer database that was being usedfor upgrade testing to outside parties via HTTP file upload. The Chief Information Officer (CIO) hasresigned and the Chief Executive Officer (CEO) has tasked the incoming CIO with putting effectivecontrols in place to help prevent this from occurring again in the future. Which of the followingcontrols is the MOST effective in preventing this threat from re-occurring?
Options are :
  • Network-based intrusion prevention system
  • Data loss prevention (Correct)
  • Host-based intrusion detection system
  • Web application firewall

Answer : Data loss prevention

The companyís marketing department needs to provide more real-time interaction with its partnersand consumers and decides to move forward with a presence on multiple social networking sitesfor sharing information. Which of the following minimizes the potential exposure of proprietaryinformation?
Options are :
  • Require a confidential statement be attached to all information released to the social networking sites.
  • Establish a social media usage policy and provide training to all marketing employees
  • Require each person joining the companyís social networking initiative to accept a nondisclosure agreement
  • Establish a specific set of trained people that can release information on the organizationís behalf. (Correct)

Answer : Establish a specific set of trained people that can release information on the organizationís behalf.

JK0-019 CompTIA E2C Network + Certification Exam Set 4

The Chief Executive Officer (CEO) has decided to outsource systems which are not core businessfunctions; however, a recent review by the risk officer has indicated that core business functionsare dependent on the outsourced systems. The risk officer has requested that the IT departmentcalculates the priority of restoration for all systems and applications under the new businessmodel. Which of the following is the BEST tool to achieve this?
Options are :
  • Annualized loss expectancy analysis
  • TCO analysis
  • Business impact analysis (Correct)
  • Residual risk and gap analysis

Answer : Business impact analysis

The Chief Information Officer (CIO) comes to the security manager and asks what can be done toreduce the potential of sensitive data being emailed out of the company. Which of the following isan active security measure to protect against this threat?
Options are :
  • Require a digital signature on all outgoing emails.
  • Implement a SPAM filter.
  • Implement a data classification policy.
  • Sanitize outgoing content. (Correct)

Answer : Sanitize outgoing content.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions