CompTIA Advanced Security Practitioner(CASP+) Practice Exams Set 2

The chief security officer wants to know the most popular biometric methods, based on user acceptance. Which of the

following is the most popular biometric method, based on user acceptance?



Options are :

  • d. retina scan
  • c. iris scan
  • b. keystroke pattern
  • a. voice pattern

Answer : a. voice pattern

BR0-003 CompTIA A+ 2009 Edition Bridge Practice Exam Set 6

Which single sign-on system is used in both UNIX and Microsoft Active Directory?



Options are :

  • a. Kerberos
  • c. WAYF
  • b. Shibboleth
  • d. OpenID

Answer : a. Kerberos

Your organization just deployed an enterprise instant messaging solution. The CIO is concerned about the transfer of worms, Trojans, and other malware through the IM connections. Which of the following would not be a measure that could help mitigate the introduction of malware through the IM system?



Options are :

  • b. Purchase a product that performs encryption.
  • c. Install an anti-malware product that can plug into the IM client.
  • d. Train users in the dangers of using IM.
  • a. Disable the ability to transfer files through the system.

Answer : b. Purchase a product that performs encryption.

Management expresses concerns about using multitenant public cloud solutions to store organizational data. You explain that

tenant data in a multitenant solution is quarantined from other tenants’ data, using tenant IDs in the data labels. What is the term for this process?



Options are :

  • b. data aggregation
  • d. data isolation
  • a. data remnants
  • c. data purging

Answer : d. data isolation

CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 4

Recently, sales people within your organization have been having trouble managing customer-related data. Management is concerned that sales figures are being negatively affected as a result of this mismanagement. You have been asked to provide a suggestion to fix this problem. What should you recommend?



Options are :

  • d. Deploy a CMS solution.
  • a. Deploy an ERP solution.
  • b. Deploy a CRM solution.
  • c. Deploy a GRC solution.

Answer : b. Deploy a CRM solution.

Your organization does not have an e-discovery process in place. Management has asked you to provide an explanation for why ediscovery is so important. What is the primary reason for this process?



Options are :

  • b. to provide intrusion detection
  • c. to provide evidence
  • a. to provide access control
  • d. to provide intrusion prevention

Answer : c. to provide evidence

Which of the following is an example of a crypto processor?



Options are :

  • a. Microsoft CryptoAPI (CAPI)
  • b. TPM chip
  • c. token
  • d. CSP

Answer : b. TPM chip

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Which of the following is a new breed of software that comes in

modules allowing for customization by the organization?



Options are :

  • c. in-house developed
  • a. tailored commercial
  • b. open source

Answer : a. tailored commercial

Which organization issues RFCs?



Options are :

  • b. IEEE
  • a. IETF
  • c. ISO
  • d. IEC

Answer : a. IETF

Which of the following utilizes software to perform integration without hardware changes?



Options are :

  • c. sandboxing
  • b. convergence
  • a. hyperconvergence
  • d. secure enclaves

Answer : a. hyperconvergence

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 15

Your company is planning to procure a web conferencing system to cut costs on travel. You have been asked to investigate the

security issues that should be considered during this process. Which of the following is not an issue to consider?



Options are :

  • c. The potential for the solution to affect network performance
  • b. The dangers of data being stored on a vendor’s shared server
  • a. Preventing uninvited guests at meetings
  • d. The possibility of information being captured during transmission

Answer : c. The potential for the solution to affect network performance

What type of traffic is the SIMPLE protocol designed to secure?



Options are :

  • b. presence
  • d. email
  • c. video conferencing
  • a. IM

Answer : b. presence

You are working with a project team to deploy several new firewalls. The initiation stage is complete, and now the team is

engaged in the acquisition stage. Which step should the team complete as part of this stage?



Options are :

  • a. Provide security categories for the new routers.
  • c. Design the security architecture.
  • b. Test the routers for security resiliency.
  • d. Update the routers with the latest updates from the vendor.

Answer : c. Design the security architecture.

220-702 CompTIA A+ Practical Application Practice Exam Set 10

In which attack does the attacker leave the VM’s normally isolated state and interact directly with the hypervisor?



Options are :

  • d. CSRF
  • c. XSS
  • b. cross violation
  • a. VMEscape

Answer : a. VMEscape

Your company is determining what data to make accessible in the new cloud-based collaboration solution. Which of the  following types of information should not be stored in a public cloud–based collaboration solution?



Options are :

  • a. price lists
  • b. financial data
  • d. company forms
  • c. catalogues

Answer : b. financial data

During a recent data breach at your organization, a forensic expert was brought in to ensure that the evidence was retained in a proper manner. The forensic expert stressed the need to ensure the chain of custody. Which of the following components is not part of the chain of custody?



Options are :

  • d. who obtained the evidence
  • c. who secured the evidence
  • a. who detected the evidence
  • b. who controlled the evidence

Answer : a. who detected the evidence

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 12

Which technology uses chips and receivers to manage inventory?



Options are :

  • c. SRTM
  • d. RFID
  • a. geolocation
  • b. geotagging

Answer : d. RFID

Your organization must comply with several industry and governmental standards to protect private and confidential

information. You must analyze which standards to implement. Which standards should you consider?



Options are :

  • b. open standards only
  • d. de jure standards only
  • a. open standards, de facto standards, and de jure standards
  • c. de facto standards only

Answer : a. open standards, de facto standards, and de jure standards

During a recent security analysis, you determined that users do not use authentication when accessing some private data. What should you do first?



Options are :

  • c. Determine whether authentication can be used.
  • b. Configure the appropriate ACL for the data.
  • a. Encrypt the data.
  • d. Implement complex user passwords.

Answer : c. Determine whether authentication can be used.

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 1

Management expresses concerns about using multitenant public cloud solutions to store organizational data. You explain that

tenant data in a multitenant solution is quarantined from other tenants’ data using tenant IDs in the data labels. What is this

condition referred to?



Options are :

  • a. data remnants
  • c. data purging
  • d. data isolation
  • b. data aggregation

Answer : d. data isolation

Which IPv4-to-IPv6 transition mechanism assigns addresses and creates host-to-host tunnels for unicast IPv6 traffic when IPv6

hosts are located behind IPv4 network address translators?



Options are :

  • c. dual stack
  • b. 6to4
  • a. GRE tunnels
  • d. Teredo

Answer : d. Teredo

SY0-401 CompTIA Security+ Certification Practice Exam Set 8

Which of the following is most likely to be affected by the Sarbanes-Oxley (SOX) Act?



Options are :

  • d. retail company
  • b. publicly traded corporation
  • a. healthcare company
  • c. federal contracting company

Answer : b. publicly traded corporation

Which of the following is not a safe computing practice?



Options are :

  • d. Keep anti-malware applications current.
  • a. Perform daily scans.
  • c. Don’t click on email links or attachments.
  • b. Enable autorun.

Answer : b. Enable autorun.

You have recently suffered some network attacks and would like to discover what services are available on the computers in your network. Which of the following assessment tools would be most appropriate for this?



Options are :

  • b. protocol analyzer
  • d. fuzzer
  • a. port scanner
  • c. password cracker

Answer : a. port scanner

CompTIA CySA+ (CS0-001) 5 Practice Certification Exams Set 1

Which form of HSM is specifically suited to mobile apps?



Options are :

  • c. Ethernet
  • b. serial
  • d. microSD
  • a. USB

Answer : d. microSD

Which of the following creates an encrypted area to hold and quarantine corporate data separately from that of the users?



Options are :

  • c. COPE
  • a. virtualization
  • d. VNC
  • b. containerization

Answer : b. containerization

Which of the following is a graphical desktop sharing system that uses the Remote Frame Buffer (RFB) protocol to remotely control another computer?



Options are :

  • d. RCP
  • a. RDP
  • c. NAC
  • b. VNC

Answer : b. VNC

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 5

As a security analyst for your organization, you have implemented several new security controls. Management requests

that you analyze the availability of several devices and provide them with the appropriate metrics. Which metrics should you

provide?



Options are :

  • d. baselines and benchmarks
  • a. ROI and TCO
  • b. MTTR and MTBF
  • c. WRT and RPO

Answer : b. MTTR and MTBF

What port number does HTTPS use?



Options are :

  • b. 443
  • c. 23
  • a. 80
  • d. 69

Answer : b. 443

Which of the following cloud approaches offers the maximum control over company data?



Options are :

  • c. hybrid
  • b. private
  • d. composite
  • a. public

Answer : b. private

CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 1

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions