CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 8

The security administrator has been tasked with providing a solution that would not only eliminatethe need for physical desktops, but would also centralize the location of all desktop applications,without losing physical control of any network devices. Which of the following would the securitymanager MOST likely implement?
Options are :
  • PaaS
  • VDI
  • IaaS
  • VLANs

Answer : VDI

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 4

As part of the testing phase in the SDLC, a software developer wants to verify that an applicationis properly handling user error exceptions. Which of the following is the BEST tool or process forthe developer use?
Options are :
  • SRTM review
  • Fuzzer
  • HTTP interceptor
  • Vulnerability assessment

Answer : Fuzzer

Which of the following is the MOST appropriate control measure for lost mobile devices?
Options are :
  • Require that the compromised devices be remotely wiped
  • Require authentication before access is given to the device
  • Disable unnecessary wireless interfaces such as Bluetooth.
  • Reduce the amount of sensitive data stored on the device.

Answer : Require that the compromised devices be remotely wiped

A business is currently in the process of upgrading its network infrastructure to accommodate apersonnel growth of over fifty percent within the next six months. All preliminary planning has beencompleted and a risk assessment plan is being adopted to decide which security controls to put inplace throughout each phase.Which of the following risk responses is MOST likely being considered if the business is creatingan SLA with a third party?
Options are :
  • Accepting risk
  • Transferring risk
  • Identifying risk
  • Mitigating risk

Answer : Transferring risk

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 7

Which of the following should be used with caution because of its ability to provide access to blocklevel data instead of file level data?
Options are :
  • iSCSI
  • NAS
  • CIFS
  • NFS

Answer : iSCSI

The IT department of a pharmaceutical research company is considering whether the companyshould allow or block access to social media websites during lunch time. The company isconsidering the possibility of allowing access only through the company’s guest wireless network,which is logically separated from the internal research network. The company prohibits the use ofpersonal devices; therefore, such access will take place from company owned laptops.Which of the following is the HIGHEST risk to the organization?
Options are :
  • Workstation compromise affecting availability
  • Intellectual property confidentiality loss
  • Employee’s professional reputation
  • Downloaded viruses on the company laptops

Answer : Intellectual property confidentiality loss

Company XYZ provides residential television cable service across a large region.The company’s board of directors is in the process of approving a deal with the following threecompanies:A National landline telephone providerA Regional wireless telephone providerAn international Internet service providerThe board of directors at Company XYZ wants to keep the companies and billing separated.While the Chief Information Officer (CIO) at Company XYZ is concerned about the confidentialityof Company XYZ’s customer data and wants to share only minimal information about itscustomers for the purpose of accounting, billing, and customer authentication.The proposed solution must use open standards and must make it simple and seamless forCompany XYZ’s customers to receive all four services.Which of the following solutions is BEST suited for this scenario?
Options are :
  • Company XYZ needs to install the SP, while the partner companies need to install the WAYF portion of a Federated identity solution.
  • Company XYZ must implement VPN and strict access control to allow the other three companies to access the internal LDAP.
  • All four companies must implement a TACACS+ web based single sign-on solution with associated captive portal technology.
  • NONE
  • Company XYZ needs to install the IdP, while the partner companies need to install the SP portion of a Federated identity solution.

Answer : Company XYZ needs to install the IdP, while the partner companies need to install the SP portion of a Federated identity solution.

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 3

On Monday, the Chief Information Officer (CIO) of a state agency received an e-discovery requestfor the release of all emails sent and received by the agency board of directors for the past fiveyears. The CIO has contacted the email administrator and asked the administrator to provide therequested information by end of day on Friday. Which of the following has the GREATEST impacton the ability to fulfill the e-discovery request?
Options are :
  • Email encryption software
  • Data recovery procedures
  • Backup software and hardware
  • Data retention policy

Answer : Data retention policy

A breach at a government agency resulted in the public release of top secret information. TheChief Information Security Officer has tasked a group of security professionals to deploy a systemwhich will protect against such breaches in the future.Which of the following can the government agency deploy to meet future security needs?
Options are :
  • A MAC which enforces no write-up, a MAC which enforces no read-down, and a DAC which uses an ACL.
  • DAC which enforces no write-up, a DAC which enforces no read-down, and a MAC which uses an ACL.
  • A DAC which enforces no read-up, a DAC which enforces no write-down, and a MAC which uses an access matrix.
  • A MAC which enforces no read-up, a MAC which enforces no write-down, and a DAC which uses an access matrix.

Answer : A MAC which enforces no read-up, a MAC which enforces no write-down, and a DAC which uses an access matrix.

Statement: “The system shall implement measures to notify system administrators prior to asecurity incident occurring.”Which of the following BEST restates the above statement to allow it to be implemented by a teamof software developers?
Options are :
  • The system shall throw an error when specified incidents pass a configurable threshold.
  • The system shall continue processing in the event of an error and email the security administrator the error logs.
  • The system shall cease processing data when certain configurable events occur.
  • The system shall halt on error.

Answer : The system shall throw an error when specified incidents pass a configurable threshold.

220-702 CompTIA A+ Practical Application Practice Exam Set 8

A security administrator of a large private firm is researching and putting together a proposal topurchase an IPS. The specific IPS type has not been selected, and the security administratorneeds to gather information from several vendors to determine a specific product. Which of thefollowing documents would assist in choosing a specific brand and model?
Options are :
  • RFC
  • RFI
  • RTO
  • RFQ

Answer : RFI

A company currently does not use any type of authentication or authorization service for remoteaccess. The new security policy states that all remote access must be locked down to onlyauthorized personnel. The policy also dictates that only authorized external networks will beallowed to access certain internal resources.Which of the following would MOST likely need to be implemented and configured on thecompany’s perimeter network to comply with the new security policy? (Select TWO).A. VPN concentratorB. FirewallC. Proxy serverD. WAPE. Layer 2 switch
Options are :
  • D,B
  • A,D
  • A,C
  • A,B

Answer : A,B

CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 8

A small company has a network with 37 workstations, 3 printers, a 48 port switch, an enterpriseclass router, and a firewall at the boundary to the ISP. The workstations have the latest patchesand all have up-to-date anti-virus software. User authentication is a two-factor system withfingerprint scanners and passwords. Sensitive data on each workstation is encrypted. The networkis configured to use IPv4 and is a standard Ethernet network. The network also has a captiveportal based wireless hot-spot to accommodate visitors. Which of the following is a problem withthe security posture of this company?
Options are :
  • IPv6 is not incorporated in the network
  • No transport security controls are implemented
  • Insufficient user authentication controls are implemented
  • No effective controls in place

Answer : No transport security controls are implemented

Driven mainly by cost, many companies outsource computing jobs which require a large amount ofprocessor cycles over a short duration to cloud providers. This allows the company to avoid alarge investment in computing resources which will only be used for a short time.Assuming the provisioned resources are dedicated to a single company, which of the following isthe MAIN vulnerability associated with on-demand provisioning?
Options are :
  • Remnants of network data from prior customers on the physical servers during a compute job
  • Exposure of proprietary data when in-transit to the cloud provider through IPSec tunnels
  • Failure of the de-provisioning mechanism resulting in excessive charges for the resources
  • Traces of proprietary data which can remain on the virtual machine and be exploited

Answer : Traces of proprietary data which can remain on the virtual machine and be exploited

Which of the following attacks does Unicast Reverse Path Forwarding prevent?
Options are :
  • Man in the Middle
  • ARP poisoning
  • IP Spoofing
  • Broadcast storm

Answer : IP Spoofing

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 8

A security administrator has been conducting a security assessment of Company XYZ for the pasttwo weeks. All of the penetration tests and other assessments have revealed zero flaws in thesystems at Company XYZ. However, Company XYZ reports that it has been the victim ofnumerous security incidents in the past six months. In each of these incidents, the criminals havemanaged to exfiltrate large volumes of data from the secure servers at the company. Which of thefollowing techniques should the investigation team consider in the next phase of their assessmentin hopes of uncovering the attack vector the criminals used?
Options are :
  • Reverse engineering
  • Code review
  • Social engineering
  • Vulnerability assessment

Answer : Social engineering

A company has decided to use the SDLC for the creation and production of a new informationsystem. The security administrator is training all users on how to protect company informationwhile using the new system, along with being able to recognize social engineering attacks. SeniorManagement must also formally approve of the system prior to it going live. In which of thefollowing phases would these security controls take place?
Options are :
  • Initiation
  • Acquisition and Development
  • Operations and Maintenance
  • Implementation

Answer : Implementation

A security analyst at Company A has been trying to convince the Information Security Officer(ISO) to allocate budget towards the purchase of a new intrusion prevention system (IPS) capableof analyzing encrypted web transactions.Which of the following should the analyst provide to the ISO to support the request? (Select TWO).A. Emerging threat reportsB. Company attack tendsC. Request for Quote (RFQ)D. Best practicesE. New technologies report
Options are :
  • A,C
  • A,D
  • A,B
  • D,B

Answer : A,B

220-701 A+ Essentials Certification Practice Exam Set 2

A telecommunication company has recently upgraded their teleconference systems to multicast.Additionally, the security team has instituted a new policy which requires VPN to access thecompany’s video conference. All parties must be issued a VPN account and must connect to thecompany’s VPN concentrator to participate in the remote meetings.Which of the following settings will increase bandwidth utilization on the VPN concentrator duringthe remote meetings?
Options are :
  • IPSec transport mode is enabled
  • Split tunneling is disabled
  • NAT-traversal is enabled
  • ICMP is disabled

Answer : Split tunneling is disabled

A corporate executive lost their smartphone while on an overseas business trip. The phone wasequipped with file encryption and secured with a strong passphrase. The phone contained over60GB of proprietary data. Given this scenario, which of the following is the BEST course of action?
Options are :
  • Execute a plan to remotely disable the device and report the loss to the police.
  • File an insurance claim and assure the executive the data is secure because it is encrypted.
  • Immediately implement a plan to remotely wipe all data from the device.
  • Have the executive change all passwords and issue the executive a new phone.

Answer : Immediately implement a plan to remotely wipe all data from the device.

A company has purchased a new system, but security personnel are spending a great deal of timeon system maintenance. A new third party vendor has been selected to maintain and manage thecompany’s system. Which of the following document types would need to be created before anywork is performed?
Options are :
  • OLA
  • SLA
  • ISA
  • IOS

Answer : SLA

CompTIA A+ (220-1001) Test Prep, Exams and Simulations Set 4

The security administrator is worried about possible SPIT attacks against the VoIP system.Which of the following security controls would MOST likely need to be implemented to detect thistype of attack?
Options are :
  • SIP and SRTP traffic analysis
  • QoS audit on Layer 3 devices
  • IP and MAC filtering logs
  • Email spam filter log

Answer : SIP and SRTP traffic analysis

Company ABC has recently completed the connection of its network to a national high speedprivate research network. Local businesses in the area are seeking sponsorship from CompanyABC to connect to the high speed research network by directly connecting through CompanyABC’s network. Company ABC’s Chief Information Officer (CIO) believes that this is anopportunity to increase revenues and visibility for the company, as well as promote research anddevelopment in the area.Which of the following must Company ABC require of its sponsored partners in order to documentthe technical security requirements of the connection?
Options are :
  • NDA
  • BPA
  • ISA
  • SLA
  • None of the Above

Answer : ISA

A security administrator has finished building a Linux server which will host multiple virtualmachines through hypervisor technology. Management of the Linux server, including monitoringserver performance, is achieved through a third party web enabled application installed on theLinux server. The security administrator is concerned about vulnerabilities in the web applicationthat may allow an attacker to retrieve data from the virtual machines.Which of the following will BEST protect the data on the virtual machines from an attack?
Options are :
  • The security administrator must install a software firewall on both the Linux server and the virtual machines.
  • The security administrator must install anti-virus software on both the Linux server and the virtual machines.
  • The security administrator must install the data exfiltration detection software on the perimeter firewall.
  • The security administrator must install the third party web enabled application in a chroot environment.

Answer : The security administrator must install the third party web enabled application in a chroot environment.

N10-006 CompTIA Network+ Certification Practice Test Set 9

A company provides on-demand virtual computing for a sensitive project. The companyimplements a fully virtualized datacenter and terminal server access with two-factor authenticationfor access to sensitive data. The security administrator at the company has uncovered a breach indata confidentiality. Sensitive data was found on a hidden directory within the hypervisor. Which ofthe following has MOST likely occurred?
Options are :
  • An employee with administrative access to the virtual guests was able to dump the guest memory onto their mapped disk.
  • A host server was left un-patched and an attacker was able to use a VMEscape attack to gain unauthorized access
  • A stolen two factor token and a memory mapping RAM exploit were used to move data from one virtual guest to an unauthorized similar token.
  • A virtual guest was left un-patched and an attacker was able to use a privilege escalation attack to gain unauthorized access.

Answer : A host server was left un-patched and an attacker was able to use a VMEscape attack to gain unauthorized access

A company is evaluating a new marketing strategy involving the use of social networking sites toreach its customers. The marketing director wants to be able to report important company news,product updates, and special promotions on the social websites.After an initial and successful pilot period, other departments want to use the social websites topost their updates as well.The Chief Information Officer (CIO) has asked the company security administrator to documentthree negative security impacts of allowing IT staff to post work related information on suchwebsites.Which of the following are the major risks the security administrator should report back to the CIO?(Select THREE).A. Brute force attacksB. Malware infectionC. DDOS attacksD. Phishing attacksE. SQL injection attacksF. Social engineering attacks
Options are :
  • B,D,F
  • B,D,C
  • B,D,A
  • C,D,F

Answer : B,D,F

Which of the following authentication types is used primarily to authenticate users through the useof tickets?
Options are :
  • Kerberos
  • RADIUS
  • TACACS+
  • LDAP

Answer : Kerberos

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 25

A security administrator needs a secure computing solution to use for all of the company’s securityaudit log storage, and to act as a central server to execute security functions from. Which of thefollowing is the BEST option for the server in this scenario?
Options are :
  • A hardened Red Hat Enterprise Linux implementation running a software firewall
  • Solaris 10 with trusted extensions or SE Linux with a trusted policy
  • A hardened bastion host with a permit all policy implemented in a software firewall
  • Windows 7 with a secure domain policy and smartcard based authentication

Answer : Solaris 10 with trusted extensions or SE Linux with a trusted policy

A newly-appointed risk management director for the IT department at Company XYZ, a majorpharmaceutical manufacturer, needs to conduct a risk analysis regarding a new system which thedevelopers plan to bring on-line in three weeks. The director begins by reviewing the thorough andwell-written report from the independent contractor who performed a security assessment of thesystem. The report details what seems to be a manageable volume of infrequently exploitedsecurity vulnerabilities. The likelihood of a malicious attacker exploiting one of the vulnerabilities islow; however, the director still has some reservations about approving the system because ofwhich of the following?
Options are :
  • Government health care regulations for the pharmaceutical industry prevent the director from approving a system with vulnerabilities.
  • The director should be uncomfortable accepting any security vulnerabilities and should find time to correct them before the system is deployed.
  • The director is new and is being rushed to approve a project before an adequate assessment has been performed.
  • The resulting impact of even one attack being realized might cripple the company financially.

Answer : The resulting impact of even one attack being realized might cripple the company financially.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions