CompTIA CA1-001 Advanced Security Practitioner Practice Exam Set 6

Which of the following is a flexible set of design principles used during tine phases of systems development and integration?


Options are :

  • Service-oriented architecture (SOA)
  • Service-oriented modeling and architecture (SOMA)
  • Sherwood Applied Business Security Architecture (SABSA)
  • Service-oriented modeling framework (SOMF)

Answer :Service-oriented architecture (SOA)

CompTIA A+ 220 902 Test Set 3

Which of the following refers to any system whereby things that are of value to an entity or group are monitored and maintained?


Options are :

  • Product management
  • Investment management
  • Asset management
  • Service management

Answer :Asset management

Which of the following statements are true about capability-based security?


Options are :

  • It is a computer security model based on the Actor model of computation.
  • It is a concept in the design of secure computing systems.
  • It is a scheme used by some computers to control access to memory.
  • It is a concept in the design of secure computing systems, one of the existing security models

Answer :It is a concept in the design of secure computing systems.

Which of the following is the capability to correct flows in the existing functionality without affecting other components of the system?


Options are :

  • Manageability
  • Availability
  • Maintainability
  • Reliability

Answer :Maintainability

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 9

Which is the process of comparing the business processes and performance metrics including cost, cycle time, productivity, or quality?


Options are :

  • Agreement
  • COBIT
  • Service Improvement Plan
  • Benchmarking

Answer :Benchmarking

Denise works as a Security Administrator for a community college. She is assessing the various risks to her network. Which of the following is not a category of risk assessment?


Options are :

  • Cost determination
  • Likelihood assessment
  • Vulnerability assessment
  • Risk determination

Answer :Cost determination

Which of the following is used to provide for the systematic review, retention and destruction of documents received or created in the course of business?


Options are :

  • Document entitled policy
  • Document research policy
  • Document compliance policy
  • Document retention policy

Answer :Document retention policy

220-802 CompTIA A+ Certification Practice Exam Set 7

Juan is trying to perform a risk analysis of his network. He has chosen to use OCTAVE. What is OCTAVE primarily used for?


Options are :

  • An impact analysis tool
  • A threat assessment tool
  • A comprehensive risk assessment model
  • A language for vulnerability assessment

Answer :A comprehensive risk assessment model

Which of the following is the process of creating or altering the systems; and the models and methodologies that people use to develop these systems?


Options are :

  • Product lifecycle management
  • Security Requirements Traceability Matrix
  • Security Development Life Cycle
  • System Development Life Cycle

Answer :System Development Life Cycle

A user has entered a user name and password at the beginning of the session, and accesses multiple applications. He does not need to re-authenticate for accessing each application. Which of the following authentication processes is he using?


Options are :

  • File authentication
  • SSO authentication
  • Mutual authentication
  • Biometric authentication

Answer :SSO authentication

CT0-101 Convergence+ Certification Practice Exam Set 12

Which of the following elements are essential elements of a privacy policy? Each correct answer represents a complete solution. Choose two.


Options are :

  • Opt-out provision
  • Notification
  • Reliability
  • Availability

Answer :Notification

Allen needs a program that injects automatically semi-random data into a program or stacks and detects bugs. What will he use?


Options are :

  • Happy path
  • Boundary value analysis
  • Fuzzer
  • Agile testing

Answer :Fuzzer

Which of the following types of Incident Response Teams (IRT) is responsible for a logical or physical segment of the infrastructure, usually of a large organization or one that is geographically dispersed?


Options are :

  • Coordinating IRT
  • Distributed IRT
  • Central IRT
  • Outsourced IRT

Answer :Distributed IRT

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 2

Which of the following is a structured review process to analyze what happened, why it happened, and how it can be done better, by the participants and those responsible for the project or event?


Options are :

  • After action report
  • After action summary
  • After action review
  • After action analysis

Answer :After action review

_____________applies enterprise architecture concepts and practices in the information security domain.


Options are :

  • ESA
  • AAR
  • OWASP
  • OVAL

Answer :ESA

Which of the following is the best description of vulnerability assessment?


Options are :

  • Determining the impact to your network if a threat is exploited.
  • Determining what threats exist to your network
  • Determining the likelihood of a given threat being exploited.
  • Determining the weaknesses in your network that would allow a threat to be exploited

Answer :Determining the weaknesses in your network that would allow a threat to be exploited

CompTIA Cloud+ Certification Test Set 1

Which of the following security services will you use for enabling message-level security for Web services?


Options are :

  • WS-Security
  • WS-Security
  • WebLogic Server security
  • Trading Partner security

Answer :WS-Security

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 7

Your manager has approached you regarding her desire to outsource certain functions to an external firm. The manager would like for you to create a document for sending to three vendors asking them for solutions for these functions that your organization is to outsource. Which type of a procurement document will you create and send to the vendors to accomplish the task?


Options are :

  • Request for Quote
  • Request for Information
  • Invitation for Bid
  • Request for Proposal

Answer :Request for Proposal

Which of the following solutions best accomplishes storage integration?


Options are :

  • Co-location
  • Virtualization
  • Cloud computing
  • Raid 5

Answer :Cloud computing

Mark is responsible for secure programming at his company. He wants to implement steps to validate the security of software design. At what phase in the SDLC should he implement design validation for security?


Options are :

  • At every phase
  • After the design phase
  • During the testing phase
  • This is not a part of SDLC

Answer :At every phase

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 6

Which of the following is a meeting of minds between two or more legally competent parties, about their relative duties and rights regarding current or future performance?


Options are :

  • Agreement
  • Scope
  • Contract negotiation
  • Service Improvement Plan

Answer :Agreement

Jane works as an administrator for a cloud computing company. Her company supports virtual servers from many organizations, in different industries. What is the most significant security concern when integrating systems from different industries?


Options are :

  • Different industries have different virus vulnerabilities
  • Different industries have different firewall requirements
  • Different industries have different regulatory requirements
  • Different industries have the same security concerns

Answer :Different industries have different regulatory requirements

Which of the following types of redundancy permits software to run simultaneously on multiple geographically distributed locations, with voting on results?


Options are :

  • Data
  • Hardware
  • Application
  • Process

Answer :Process

CompTIA JK0-801 A Laptop Printer and Operating certify Exam Set 6

Which of the following is a document used to solicit proposals from prospective sellers which require a significant amount of negotiation?


Options are :

  • RPQ
  • RFI
  • RFP
  • RFQ

Answer :RFP

Which of the following is a version of netcat with integrated transport encryption capabilities?


Options are :

  • Cryptcat
  • Nikto
  • Socat
  • Encat

Answer :Cryptcat

Juan is responsible for IT security at an insurance firm. He has several severs that are going to be retired. Which of the following is NOT one of the steps in decommissioning equipment?


Options are :

  • Follow through
  • Communicate
  • Plan
  • Review

Answer :Review

CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 3

Denish works as a Security Administrator for a United States defense contractor. He wants to ensure that all systems have appropriate security precautions, based on their total score. Which of the following standards should he refer to?


Options are :

  • OVAL
  • OWASP
  • CIA
  • DIACAP

Answer :DIACAP

Which of the following protocols is used by voice terminal to communicate with the VoIP server? Each correct answer represents a complete solution. Choose all that apply


Options are :

  • H.323
  • RSTP
  • SIP
  • MGCP

Answer :H.323 SIP

Which of the following statements are true about a smartphone? Each correct answer represents a complete solution. Choose two.


Options are :

  • It allows telephone calls to be made over an IP network.
  • It allows the user to install and run more advanced applications based on a specific platform.
  • It is a mobile phone with advanced PC like capabilities.
  • It can be simple software-based Softphones or purpose-built hardware devices that appear much like an ordinary telephone or a cordless phone.

Answer :It allows the user to install and run more advanced applications based on a specific platform. It is a mobile phone with advanced PC like capabilities.

CompTIA JK0-022 E2C Security+ Compliance & Operational Exam Set 9

Susan is trying to find a solution that will verify emails come from the source claimed. Which of the following solutions is most likely to accomplish this?


Options are :

  • SHA hashing
  • AES encryption
  • Any hashing
  • Digital signatures

Answer :Digital signatures

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions