CompTIA CA1-001 Advanced Security Practitioner Practice Exam Set 2

Which of the following statements are true about mergers? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • . Mergers occur when the merging companies have their different consent.
  • Mergers can be vertical, horizontal, congeneric or conglomerate, depending or the nature of the merging companies.
  • Mergers refer to the aspect of corporate strategy, corporate finance and management dealing with the buying, selling, dividing, and combining of different companies,
  • Mergers present the involved parties with special challenges that must be navigated unto agreement.

Answer :. Mergers occur when the merging companies have their different consent. Mergers can be vertical, horizontal, congeneric or conglomerate, depending or the nature of the merging companies. Mergers refer to the aspect of corporate strategy, corporate finance and management dealing with the buying, selling, dividing, and combining of different companies,

CompTIA JK0-801 A+ Certification Practical Exam Set 1

Which of the following is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally?


Options are :

  • Data handling
  • Data breach
  • Data recovery
  • Data Erasure

Answer :Data recovery

_________ consists of very large-scale virtualized, distributed computing systems. They cover multiple administrative domains and enable virtual organizations.


Options are :

  • Edge computing
  • Cloud computing
  • Virtualized computing
  • Grid computing

Answer :Grid computing

Which of the following is a computer program that is designed to assess computers, computer systems, networks, or applications for weaknesses?


Options are :

  • Port scanner
  • Paros
  • Vulnerability scanner
  • SYN scan

Answer :Vulnerability scanner

CompTIA Security+ Certification (SY0-501): Sample

Juan is working as a Security Administrator for a credit card processing company. He is concerned about PCI compliance and so, he uses network segmentation. How does segmentation help Juan?


Options are :

  • Segmentation would help prevent viruses.
  • Segmentation is required by PCI regulations.
  • Segmentation would have no effect.
  • Segmentation reduces the scope of machines that need to be PCI compliant.

Answer :Segmentation reduces the scope of machines that need to be PCI compliant.

Dipen is looking for a method to effectively get security policies read by staff and management, which of the following is the best solution?


Options are :

  • Intranet Website
  • Email blast
  • Routine informational meetings
  • Printed policies

Answer :Intranet Website

Which of the following features are provided by SAN for SQL servers? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Storage efficiencies
  • Faster disaster recovery
  • Increased database size
  • Non-clustered environment

Answer :Storage efficiencies Faster disaster recovery Increased database size

CD0-001 CDIA+ Certification Practice Exam Set 9

Interceptor is a pseudo proxy server that performs HTTP diagnostics, which of the following features are provided by HTTP Interceptor? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • It can view each entire HTTP header.
  • It allows to browse anonymously by withholding Referrer tag, and user agent.
  • It debugs DOC, DOCX, and JPG file.
  • It controls cookies being sent and received.

Answer :It can view each entire HTTP header. It allows to browse anonymously by withholding Referrer tag, and user agent. It controls cookies being sent and received.

You work as a security administrator for uCertify Inc. You are conducting a security awareness campaign for the employees of the organization. What information will you provide to the employees about the security awareness program? Each correct answer represents a complete solution. Choose three.


Options are :

  • It enhances the skills and knowledge so that the computer users can perform their jobs more securely.
  • It constructs in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems.
  • It improves awareness of the need to protect system resources.
  • It improves the possibility for career advancement of the IT staff.

Answer :It enhances the skills and knowledge so that the computer users can perform their jobs more securely. It constructs in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems. It improves awareness of the need to protect system resources.

Which of the following is the predicted elapsed time between inherent failures of a system during operation?


Options are :

  • Mean down time
  • Mean time between failures
  • Mean time to repair
  • Mean time to recovery

Answer :Mean time between failures

CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 1

Juan is trying to perform a risk analysis of his network. He has chosen to use OCTAVE. What is OCTAVE primarily used for?


Options are :

  • A threat assessment tool
  • A comprehensive risk assessment model
  • A language for vulnerability assessment
  • An impact analysis tool

Answer :A comprehensive risk assessment model

220-701 A+ Essentials Certification Practice Exam Set 9

Which of the following is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously?


Options are :

  • Electronic mail
  • Video conferencing
  • Instant messaging
  • Audio conferencing

Answer :Video conferencing

Which of the following is used to provide for the systematic review, retention and destruction of documents received or created in the course of business?


Options are :

  • Document entitled policy
  • Document compliance policy
  • Document research policy
  • Document retention policy

Answer :Document retention policy

Allen needs a program that injects automatically semi-random data into a program or stacks and detects bugs. What will he use?


Options are :

  • Happy path
  • Agile testing
  • Fuzzer
  • Boundary value analysis

Answer :Fuzzer

SY0-401 CompTIA Security+ Certification Practice Exam Set 2

___________is defined as maintaining ongoing awareness of information


Options are :

  • Continuous Monitoring
  • Security Awareness
  • Vulnerability assessment
  • Intrusion detection

Answer :Continuous Monitoring

A user has entered a user name and password at the beginning of the session, and accesses multiple applications. He does not need to re-authenticate for accessing each application. Which of the following authentication processes is he using?


Options are :

  • Mutual authentication
  • SSO authentication
  • File authentication
  • Biometric authentication

Answer :SSO authentication

Which of the following statements are true about prototypes? Each correct answer represents a complete solution. Choose three.


Options are :

  • It reduces initial project risks within a business organization
  • It helps verify some of the application requirements that are not dearly defined by a user.
  • It confirms technology recommendations for an application.
  • It reduces the closeness between what a developer has defined for application architecture and what business management has understood.

Answer :It reduces initial project risks within a business organization It helps verify some of the application requirements that are not dearly defined by a user. It confirms technology recommendations for an application.

CompTIA CySA+ (CS0-001)

Mark works as a Network Security Administrator for uCertify Inc. The organization is using an intranet to distribute information to its employees. A database residing on the network contains employees' information, such as employee name, designation, department, phone extension, date of birth, date of joining, etc. He is concerned about the security because the database has all information about employees, which can help an unauthorized person to recognize an individual. Which Personally Identifiable Information should be removed from the database so that the unauthorized person cannot identify an individual?


Options are :

  • Employee name
  • Date of birth
  • Employee code
  • Date of joining

Answer :Date of birth

Which of the following are examples of privilege escalation? Each correct answer represents a complete solution. Choose two.


Options are :

  • John uses SQL commands to login to a website he does not have authorization to
  • Fred uses Ophcrack to get a Windows XP password
  • John logs in as a standard user but uses a flaw in the system to get admin privilege
  • Juan logs in with his account, then takes over Anita's privileges

Answer :John logs in as a standard user but uses a flaw in the system to get admin privilege Juan logs in with his account, then takes over Anita's privileges

Which of the following is a flexible set of design principles used during tine phases of systems development and integration?


Options are :

  • Service-oriented architecture (SOA)
  • Service-oriented modeling framework (SOMF)
  • Sherwood Applied Business Security Architecture (SABSA)
  • Service-oriented modeling and architecture (SOMA)

Answer :Service-oriented architecture (SOA)

CompTIA JK0-801 A Laptop Printer and Operating certify Exam Set 1

Which of the following security measures would be most effective against a memory exhaustion DoS attack?


Options are :

  • SPI Firewall
  • Checking user inputs
  • Secure programming
  • Truncating buffers

Answer :Secure programming

Which is the process of comparing the business processes and performance metrics including cost, cycle time, productivity, or quality?


Options are :

  • Agreement
  • COBIT
  • Benchmarking
  • Service Improvement Plan

Answer :Benchmarking

Which of the following are the purposes of the Cost-benefit analysis process? Each correct answer represents a complete solution. Choose two.


Options are :

  • To describe the future value on the investment of the project
  • To support benefit management, measurement, and reporting
  • To see how it compares with alternate projects
  • To determine if an investment is sound

Answer :To see how it compares with alternate projects To determine if an investment is sound

CompTIA Security+ Cert. (SY0-501): Practice Tests 2019 Set 6

Allen is a network administrator for a hosting company. Multiple different companies store data on the same server. Which of the following is the best method to reduce security issues from co-mingling?


Options are :

  • Install each data set on a separate VM
  • Install each data set on a separate drive
  • Install each data set on the same drive, but use EFS to encrypt each data set separately.
  • Install each data set on a separate partition

Answer :Install each data set on a separate VM

Which of the following is an approximate of the average or mean time until a component's first failure or disruption in the operation of the product, process, procedure, or design takes place?


Options are :

  • MSDS
  • MTF
  • MTBF
  • HMA

Answer :MTF

Which of the following refers to any system whereby things that are of value to an entity or group are monitored and maintained?


Options are :

  • Investment management
  • Product management
  • Asset management
  • Service management

Answer :Asset management

CompTIA JK0-801 A Laptop Printer and Operating certify Exam Set 2

Mark works as a Human Resource Manager for uCertify Inc. He is responsible to hiring some new employees for the company and improving the organization's overall security by turning employees among numerous job positions. What will Mark do to accomplish the task?


Options are :

  • Separation of duties
  • Mandatory Vacations
  • Job rotation
  • Job responsibility

Answer :Job rotation

Which of the following is a log that contains records of login/logout activity or other security-related events specified by the systems audit policy?


Options are :

  • Security Log
  • Process tracking
  • Object Manager
  • Logon event

Answer :Security Log

which of the following is the randomness collected by an operating system or application for use in cryptography or other uses that require random data?


Options are :

  • Digital signature
  • Diffusion
  • Entrop
  • Confusion

Answer :Entrop

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 7

Which of the following is the capability to correct flows in the existing functionality without affecting other components of the system?


Options are :

  • Maintainability
  • Manageability
  • Availability
  • Reliability

Answer :Maintainability

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions