CompTIA CAS-002 Advanced Security Practitioner Certify Exam Set 2

There have been some failures of the company?s internal facing website. A security engineer has found the WAF to be the root cause of the failures. System logs show that the WAF has been unavailable for 14 hours over the past month, in four separate situations. One of these situations was a two hour scheduled maintenance time, aimed at improving the stability of the WAF. Using the MTTR based on the last month?s performance figures, which of the following calculations is the percentage of uptime assuming there were 722 hours in the month?


Options are :

  • 92.24 percent
  • 98.34 percent
  • 92.24 percent
  • 99.72 percent

Answer :98.34 percent

CL0-001 CompTIA Cloud Essentials Practice Test Set 3

The technology steering committee is struggling with increased requirements stemming from an increase in telecommuting. The organization has not addressed telecommuting in the past. The implementation of a new SSL-VPN and a VOIP phone solution enables personnel to work from remote locations with corporate assets. Which of the following steps must the committee take FIRST to outline senior management?s directives?


Options are :

  • Publish a policy that addresses the security requirements for working remotely with company equipment.
  • Work with mid-level managers to identify and document the proper procedures for telecommuting.
  • Develop an information classification scheme that will properly secure data on corporate systems.
  • Implement database views and constrained interfaces so remote users will be unable to access PII from personal equipment.

Answer :Publish a policy that addresses the security requirements for working remotely with company equipment.

A security administrator wants to prevent sensitive data residing on corporate laptops and desktops from leaking outside of the corporate network. The company has already implemented full-disk encryption and has disabled all peripheral devices on its desktops and laptops. Which of the following additional controls MUST be implemented to minimize the risk of data leakage? (Select TWO).


Options are :

  • Strong authentication should be implemented via external biometric devices.
  • A full-system backup should be implemented to a third-party provider with strong encryption for data in transit.
  • Full-drive file hashing should be implemented with hashes stored on separate storage.
  • Full-tunnel VPN should be required for all network communication.
  • A DLP gateway should be installed at the company border.

Answer :Full-tunnel VPN should be required for all network communication. A DLP gateway should be installed at the company border.

The Chief Executive Officer (CEO) of a large prestigious enterprise has decided to reduce business costs by outsourcing to a third party company in another country. Functions to be outsourced include: business analysts, testing, software development and back office functions that deal with the processing of customer data. The Chief Risk Officer (CRO) is concerned about the outsourcing plans. Which of the following risks are MOST likely to occur if adequate controls are not implemented?


Options are :

  • Improper handling of client data, interoperability agreement issues and regulatory issues
  • Improper handling of customer data, loss of intellectual property and reputation damage
  • Cultural differences, increased cost of doing business and divestiture issues
  • Geographical regulation issues, loss of intellectual property and interoperability agreement issues

Answer :Improper handling of customer data, loss of intellectual property and reputation damage

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 1

A security administrator wants to deploy a dedicated storage solution which is inexpensive, can natively integrate with AD, allows files to be selectively encrypted and is suitable for a small number of users at a satellite office. Which of the following would BEST meet the requirement?


Options are :

  • NAS
  • Virtual storage
  • Virtual SAN
  • SAN

Answer :NAS

A university requires a significant increase in web and database server resources for one week, twice a year, to handle student registration. The web servers remain idle for the rest of the year. Which of the following is the MOST cost effective way for the university to securely handle student registration?


Options are :

  • Move the database servers and web servers to an elastic private cloud.
  • Move the database servers to an elastic private cloud while keeping the web servers local.
  • Virtualize the web servers locally to add capacity during registration.
  • Move the web servers to an elastic public cloud while keeping the database servers local.

Answer :Move the web servers to an elastic public cloud while keeping the database servers local.

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 13

In order to reduce costs and improve employee satisfaction, a large corporation is creating a BYOD policy. It will allow access to email and remote connections to the corporate enterprise from personal devices; provided they are on an approved device list. Which of the following security measures would be MOST effective in securing the enterprise under the new policy? (Select TWO).


Options are :

  • Provide free email software for personal devices.
  • Require smart card authentication for all devices.
  • Implement NAC to limit insecure devices access.
  • Enable time of day restrictions for personal devices.
  • Encrypt data in transit for remote access.

Answer :Implement NAC to limit insecure devices access. Encrypt data in transit for remote access.

A security administrator has been asked to select a cryptographic algorithm to meet the criteria of a new application. The application utilizes streaming video that can be viewed both on computers and mobile devices. The application designers have asked that the algorithm support the transport encryption with the lowest possible performance overhead. Which of the following recommendations would BEST meet the needs of the application designers? (Select TWO).


Options are :

  • Use RC4 in Cipher Block Chaining mode
  • Use AES with cipher text padding
  • Use AES in Counter mode
  • Use AES in Electronic Codebook mode
  • Use RC4 with Fixed IV generation
  • Use RC4 with a nonce generated IV

Answer :Use AES with cipher text padding Use RC4 with a nonce generated IV

A security analyst, Ann, states that she believes Internet facing file transfer servers are being attacked. Which of the following is evidence that would aid Ann in making a case to management that action needs to be taken to safeguard these servers?


Options are :

  • Establish alerts at a certain threshold to notify the analyst of high activity
  • Compare the current activity to the baseline of normal activity
  • Provide a report showing the file transfer logs of the servers
  • Provide a report of all the IP addresses that are connecting to the systems and their locations

Answer :Compare the current activity to the baseline of normal activity

CD0-001 CDIA+ Certification Practice Exam Set 1

A Chief Information Security Officer (CISO) has requested that a SIEM solution be implemented. The CISO wants to know upfront what the projected TCO would be before looking further into this concern. Two vendor proposals have been received: Vendor A: product-based solution which can be purchased by the pharmaceutical company. Capital expenses to cover central log collectors, correlators, storage and management consoles expected to be $250,000. Operational expenses are expected to be a 0.5 full time employee (FTE) to manage the solution, and 1 full time employee to respond to incidents per year. Vendor B: managed service-based solution which can be the outsourcer for the pharmaceutical company?s needs. Bundled offering expected to be $200,000 per year. Operational expenses for the pharmaceutical company to partner with the vendor are expected to be a 0.5 FTE per year. Internal employee costs are averaged to be $80,000 per year per FTE. Based on calculating TCO of the two vendor proposals over a 5 year period, which of the following options is MOST accurate?


Options are :

  • Based on cost alone, having an outsourced solution appears to be more expensive.
  • Based on cost alone, having a purchased product solution appears cheaper.
  • Based on cost alone, having an outsourced solution appears cheaper
  • Based on cost alone, both outsourced an in-sourced solutions appear to be the same.

Answer :Based on cost alone, having an outsourced solution appears cheaper

An organization has implemented an Agile development process for front end web application development. A new security architect has just joined the company and wants to integrate security activities into the SDLC. Which of the following activities MUST be mandated to ensure code quality from a security perspective? (Select TWO).


Options are :

  • For each major iteration penetration testing is performed
  • Security requirements are story boarded and make it into the build
  • Daily stand-up meetings are held to ensure security requirements are understood
  • Static and dynamic analysis is run as part of integration
  • Security standards and training is performed as part of the project

Answer :For each major iteration penetration testing is performed Static and dynamic analysis is run as part of integration

ABC Corporation uses multiple security zones to protect systems and information, and all of the VM hosts are part of a consolidated VM infrastructure. Each zone has different VM administrators. Which of the following restricts different zone administrators from directly accessing the console of a VM host from another zone?


Options are :

  • Ensure hypervisor layer firewalling between all VM hosts regardless of security zone.
  • Require multi-factor authentication when accessing the console at the physical VM host.
  • Organize VM hosts into containers based on security zone and restrict access using an ACL.
  • Ensure hypervisor layer firewalling between all VM hosts regardless of security zone.

Answer :Organize VM hosts into containers based on security zone and restrict access using an ACL.

CA1-001 CompTIA Advanced Security Practitioner Practice Exam Set 2

A penetration tester is inspecting traffic on a new mobile banking application and sends the following web request: POST http://www.example.com/resources/NewBankAccount HTTP/1.1 Content-type: application/json { "account": [ { "creditAccount":"Credit Card Rewards account"} { "salesLeadRef":"www.example.com/badcontent/exploitme.exe"} ], "customer": [ { "name":"Joe Citizen"} { "custRef":"3153151"} ] } { "newAccountDetails": [ { "cardNumber":"1234123412341234"} { "cardExpiry":"2020-12-31"} { "cardCVV":"909"} ], "marketingCookieTracker":"JSESSIONID=000000001" "returnCode":"Account added successfully" } Which of the following are security weaknesses in this example? (Select TWO).


Options are :

  • Vulnerable to XSS
  • Sensitive details communicated in clear-text
  • Vulnerable to malware file uploads
  • Vulnerable to SQL injection
  • Missing input validation on some fields

Answer :Sensitive details communicated in clear-text Missing input validation on some fields

Which of the following would be used in forensic analysis of a compromised Linux system? (Select THREE).


Options are :

  • Check timestamps for files modified around time of compromise
  • Check log files for logins from unauthorized IPs
  • Check /proc/kmem for fragmented memory segments
  • Check for unencrypted passwords in /etc/shadow.
  • Use vmstat to look for excessive disk I/O.

Answer :Check timestamps for files modified around time of compromise Check log files for logins from unauthorized IPs Use vmstat to look for excessive disk I/O.

A recently hired security administrator is advising developers about the secure integration of a legacy in-house application with a new cloud based processing system. The systems must exchange large amounts of fixed format data such as names, addresses, and phone numbers, as well as occasional chunks of data in unpredictable formats. The developers want to construct a new data format and create custom tools to parse and process the data. The security administrator instead suggests that the developers:


Options are :

  • Implement a de facto corporate standard for all analyzed data.
  • Only document the data format in the parsing application code.
  • Create a custom standard to define the data.
  • Use well formed standard compliant XML and strict schemas.

Answer :Use well formed standard compliant XML and strict schemas.

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 4

Company XYZ provides hosting services for hundreds of companies across multiple industries including healthcare, education, and manufacturing. The security architect for company XYZ is reviewing a vendor proposal to reduce company XYZ?s hardware costs by combining multiple physical hosts through the use of virtualization technologies. The security architect notes concerns about data separation, confidentiality, regulatory requirements concerning PII, and administrative complexity on the proposal. Which of the following BEST describes the core concerns of the security architect?


Options are :

  • The availability requirements in SLAs with each hosted customer would have to be re-written to account for the transfer of virtual machines between physical platforms for regular maintenance.
  • Company XYZ could be liable for disclosure of sensitive data from one hosted customer when accessed by a malicious user who has gained access to the virtual machine of another hosted customer.
  • Not all of company XYZ?s customers require the same level of security and the administrative complexity of maintaining multiple security postures on a single hypervisor negates hardware cost savings.
  • Most of company XYZ?s customers are willing to accept the risks of unauthorized disclosure and access to information by outside users.

Answer :Company XYZ could be liable for disclosure of sensitive data from one hosted customer when accessed by a malicious user who has gained access to the virtual machine of another hosted customer.

Which of the following represents important technical controls for securing a SAN storage infrastructure? (Select TWO).


Options are :

  • Synchronous copy of data
  • Port mapping
  • Storage pool space allocation
  • Data de-duplication
  • LUN masking/mapping
  • RAID configuration

Answer :Port mapping LUN masking/mapping

The latest independent research shows that cyber attacks involving SCADA systems grew an average of 15% per year in each of the last four years, but that this year?s growth has slowed to around 7%. Over the same time period, the number of attacks against applications has decreased or stayed flat each year. At the start of the measure period, the incidence of PC boot loader or BIOS based attacks was negligible. Starting two years ago, the growth in the number of PC boot loader attacks has grown exponentially. Analysis of these trends would seem to suggest which of the following strategies should be employed?


Options are :

  • Spending all controls should increase by 15% to start; spending on application controls should be suspended, and PC boot loader protection research should increase by 100%.
  • Spending on SCADA security controls should stay steady; application control spending should decrease slightly and spending on PC boot loader protections should increase substantially.
  • Spending on SCADA protections should stay steady; application control spending should increase substantially and spending on PC boot loader controls should increase substantially.
  • Spending on SCADA security controls should increase by 15%; application control spending should increase slightly, and spending on PC boot loader protections should remain steady.

Answer :Spending on SCADA security controls should stay steady; application control spending should decrease slightly and spending on PC boot loader protections should increase substantially.

CompTIA JK0-022 Security Cryptography Certification Exam Set 8

It has come to the IT administrator?s attention that the "post your comment" field on the company blog page has been exploited, resulting in cross-site scripting attacks against customers reading the blog. Which of the following would be the MOST effective at preventing the "post your comment" field from being exploited?


Options are :

  • Patch the web application
  • Update the blog page to HTTPS
  • Filter metacharacters
  • Install HIDS on the server

Answer :Filter metacharacters

A port in a fibre channel switch failed, causing a costly downtime on the company?s primary website. Which of the following is the MOST likely cause of the downtime?


Options are :

  • The web server was not multipathed.
  • The SAN snapshots were not up-to-date.
  • The web server iSCSI initiator was down.
  • The SAN replication to the backup site failed.

Answer :The web server was not multipathed.

Customers are receiving emails containing a link to malicious software. These emails are subverting spam filters. The email reads as follows: Delivered-To: [email protected] Received: by 10.14.120.205 Mon, 1 Nov 2010 11:15:24 -0700 (PDT) Received: by 10.231.31.193 Mon, 01 Nov 2010 11:15:23 -0700 (PDT) Return-Path: Received: from 127.0.0.1 for ; Mon, 1 Nov 2010 13:15:14 - 0500 (envelope-from ) Received: by smtpex.example.com (SMTP READY) with ESMTP (AIO); Mon, 01 Nov 2010 13:15:14 -0500 Received: from 172.18.45.122 by 192.168.2.55; Mon, 1 Nov 2010 13:15:14 -0500 From: Company To: "[email protected]" Date: Mon, 1 Nov 2010 13:15:11 -0500 Subject: New Insurance Application Thread-Topic: New Insurance Application Please download and install software from the site below to maintain full access to your account. www.examplesite.com Additional information: The authorized mail servers IPs are 192.168.2.10 and 192.168.2.11. The network?s subnet is 192.168.2.0/25. Which of the following are the MOST appropriate courses of action a security administrator could take to eliminate this risk? (Select TWO).


Options are :

  • Identify the origination point for malicious activity on the unauthorized mail server.
  • Block port 25 on the firewall for all unauthorized mail servers
  • Disable open relay functionality
  • Shut down the SMTP service on the unauthorized mail server.
  • Enable STARTTLS on the spam filter.

Answer :Block port 25 on the firewall for all unauthorized mail servers Shut down the SMTP service on the unauthorized mail server.

BR0-001 CompTIA Bridge Security+ Certification Practice Exam Set 3

An organization would like to allow employees to use their network username and password to access a third-party service. The company is using Active Directory Federated Services for their directory service. Which of the following should the company ensure is supported by the third-party? (Select TWO).


Options are :

  • NTLM
  • LDAP/S
  • Kerberos
  • OAUTH
  • SAML

Answer :Kerberos SAML

A user is suspected of engaging in potentially illegal activities. Law enforcement has requested that the user continue to operate on the network as normal. However, they would like to have a copy of any communications from the user involving certain key terms. Additionally, the law enforcement agency has requested that the user's ongoing communication be retained in the user's account for future investigations. Which of the following will BEST meet the goals of law enforcement?


Options are :

  • Perform a back up of the user's email account. Next, export the applicable emails that match the search terms.
  • Perform an e-discover using the applicable search terms. Next, back up the user's email for a future investigation.
  • Place a legal hold on the user's email account. Next, perform e-discovery searches to collect applicable emails.
  • Begin a chain-of-custody on for the user's communication. Next, place a legal hold on the user's email account.

Answer :Place a legal hold on the user's email account. Next, perform e-discovery searches to collect applicable emails.

A business unit of a large enterprise has outsourced the hosting and development of a new external website which will be accessed by premium customers, in order to speed up the time to market timeline. Which of the following is the MOST appropriate?


Options are :

  • Outsourcing transfers all the risk to the third party. An SLA should be in place for the resolution of newly identified vulnerabilities and penetration / vulnerability testing should be conducted regularly.
  • The use of external organizations to provide hosting and web development services is not recommended as the costs are typically higher than what can be achieved internally. In addition, compliance with privacy regulations becomes more complex and guaranteed uptimes are difficult to track and measure.
  • Outsourcing transfers the risk to the third party, thereby minimizing the cost and any legal obligations. An MOU should be in place for the resolution of newly identified vulnerabilities and penetration / vulnerability testing should be conducted regularly.
  • The external party providing the hosting and website development should be obligated under contract to provide a secure service which is regularly tested (vulnerability and penetration). SLAs should be in place for the resolution of newly identified vulnerabilities and a guaranteed uptime.

Answer :The external party providing the hosting and website development should be obligated under contract to provide a secure service which is regularly tested (vulnerability and penetration). SLAs should be in place for the resolution of newly identified vulnerabilities and a guaranteed uptime.

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 9

A forensic analyst works for an e-discovery firm where several gigabytes of data are processed daily. While the business is lucrative, they do not have the resources or the scalability to adequately serve their clients. Since it is an e-discovery firm where chain of custody is important, which of the following scenarios should they consider?


Options are :

  • Offload some data processing to a public cloud
  • Aligning their client intake with the resources available
  • Outsourcing the service to a third party cloud provider
  • Using a community cloud with adequate controls

Answer :Using a community cloud with adequate controls

Joe, a penetration tester, is tasked with testing the security robustness of the protocol between a mobile web application and a RESTful application server. Which of the following security tools would be required to assess the security between the mobile web application and the RESTful application server? (Select TWO).


Options are :

  • Vulnerability scanner
  • Network enumerator
  • Jailbroken mobile device
  • Reconnaissance tools
  • HTTP interceptor

Answer :Vulnerability scanner HTTP interceptor

A web developer is responsible for a simple web application that books holiday accommodations. The front-facing web server offers an HTML form, which asks for a user?s age. This input gets placed into a signed integer variable and is then checked to ensure that the user is in the adult age range. Users have reported that the website is not functioning correctly. The web developer has inspected log files and sees that a very large number (in the billions) was submitted just before the issue started occurring. Which of the following is the MOST likely situation that has occurred?


Options are :

  • The age variable has had an integer overflow and was assigned a very small negative number which led to unpredictable application behavior. Improper error handling prevented the application from recovering.
  • The age variable stored the large number and filled up disk space which stopped the application from continuing to function. Improper error handling prevented the application from recovering.
  • Computers are able to store numbers well above "billions" in size. Therefore, the website issues are not related to the large number being input.
  • The application has crashed because a very large integer has lead to a "divide by zero". Improper error handling prevented the application from recovering.

Answer :The age variable has had an integer overflow and was assigned a very small negative number which led to unpredictable application behavior. Improper error handling prevented the application from recovering.

220-701 A+ Essentials Certification Practice Exam Set 9

The risk manager is reviewing a report which identifies a requirement to keep a business critical legacy system operational for the next two years. The legacy system is out of support because the vendor and security patches are no longer released. Additionally, this is a proprietary embedded system and little is documented and known about it. Which of the following should the Information Technology department implement to reduce the security risk from a compromise of this system?


Options are :

  • Segment the device on its own secure network.
  • Virtualize the system and migrate it to a cloud provider.
  • Install an antivirus and HIDS on the system.
  • Hire developers to reduce vulnerabilities in the code.

Answer :Segment the device on its own secure network.

Which of the following BEST constitutes the basis for protecting VMs from attacks from other VMs hosted on the same physical platform?


Options are :

  • Host based IDS sensors on all guest OSs
  • Unique Network Interface Card (NIC) assignment per guest OS.
  • Different antivirus solutions between the host and guest OSs
  • Aggressive patch management on the host and guest OSs

Answer :Aggressive patch management on the host and guest OSs

A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO).


Options are :

  • The client-server handshake is based on TLS authentication.
  • The X509 V3 certificate is expired.
  • The client-server handshake is configured with a wrong priority.
  • The client-server handshake could not negotiate strong ciphers
  • The X509 V3 certificate was issued by a non trusted public CA.

Answer :The client-server handshake is configured with a wrong priority. The client-server handshake could not negotiate strong ciphers

SY0-401 CompTIA Security+ Certification Practice Exam Set 4

The helpdesk is receiving multiple calls about slow and intermittent Internet access from the finance department. The following information is compiled: Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0 Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0 Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0 All callers are connected to the same switch and are routed by a router with five built-in interfaces. The upstream router interface?s MAC is 00-01-42-32-ab-1a A packet capture shows the following: 09:05:15.934840 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a) 09:06:16.124850 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a) 09:07:25.439811 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a) 09:08:10.937590 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2305, seq 1, length 65534 09:08:10.937591 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2306, seq 2, length 65534 09:08:10.937592 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2307, seq 3, length 65534 Which of the following is occurring on the network?


Options are :

  • The default gateway is being spoofed on the network.
  • A man-in-the-middle attack is underway on the network.
  • An ARP flood attack is targeting at the router
  • A denial of service attack is targeting at the router.

Answer :A denial of service attack is targeting at the router.

Ann is testing the robustness of a marketing website through an intercepting proxy. She has intercepted the following HTTP request: POST /login.aspx HTTP/1.1 Host: comptia.org Content-type: text/html txtUsername=ann&txtPassword=ann&alreadyLoggedIn=false&submit=true Which of the following should Ann perform to test whether the website is susceptible to a simple authentication bypass?


Options are :

  • Remove all of the post data and change the request to /login.aspx from POST to GET
  • Attempt to brute force all usernames and passwords using a password cracker
  • Remove the txtPassword post data and change alreadyLoggedIn from false to true
  • Remove the txtUsername and txtPassword post data and toggle submit from true to false

Answer :Remove the txtPassword post data and change alreadyLoggedIn from false to true

An extensible commercial software system was upgraded to the next minor release version to patch a security vulnerability. After the upgrade, an unauthorized intrusion into the system was detected. The software vendor is called in to troubleshoot the issue and reports that all core components were updated properly. Which of the following has been overlooked in securing the system? (Select TWO).


Options are :

  • The company?s custom code was not patched.
  • The company?s IDS signatures were not updated.
  • The patch caused the system to revert to http.
  • The software patch was not cryptographically signed.
  • Third-party plug-ins were not patched.

Answer :The company?s custom code was not patched. Third-party plug-ins were not patched.

SK0-004 CompTIA Server+ Certification Practice Exam Set 4

An administrator wishes to replace a legacy clinical software product as it has become a security risk. The legacy product generates $20,000 in revenue a month. The new software product has an initial cost of $280,000 and a yearly maintenance of $2,000 after the first year. However, it will generate $25,000 in revenue per month and be more secure. How many years until there is a return on investment for this new package?


Options are :

  • 4
  • 1
  • 2
  • 3

Answer :4

Joe is a security architect who is tasked with choosing a new NIPS platform that has the ability to perform SSL inspection, analyze up to 10Gbps of traffic, can be centrally managed and only reveals inspected application payload data to specified internal security employees. Which of the following steps should Joe take to reach the desired outcome?


Options are :

  • Consider outsourcing the product evaluation and ongoing management to an outsourced provider on the basis that each of the requirements are met and a lower total cost of ownership (TCO) is achieved.
  • Research new technology vendors to look for potential products. Contribute to an RFP and then evaluate RFP responses to ensure that the vendor product meets all mandatory requirements. Test the product and make a product recommendation.
  • Evaluate relevant RFC and ISO standards to choose an appropriate vendor product. Research industry surveys, interview existing customers of the product and then recommend that the product be purchased.
  • Choose a popular NIPS product and then consider outsourcing the ongoing device management to a cloud provider. Give access to internal security employees so that they can inspect the application payload data.

Answer :Research new technology vendors to look for potential products. Contribute to an RFP and then evaluate RFP responses to ensure that the vendor product meets all mandatory requirements. Test the product and make a product recommendation.

Two separate companies are in the process of integrating their authentication infrastructure into a unified single sign-on system. Currently, both companies use an AD backend and two factor authentication using TOTP. The system administrators have configured a trust relationship between the authentication backend to ensure proper process flow. How should the employees request access to shared resources before the authentication integration is complete?


Options are :

  • They should logon to the system using the newly assigned global username: first.lastname#### where #### is the second factor code.
  • They should use the username format: [email protected], together with a password and their 6-digit code.
  • They should logon to the system using the username concatenated with the 6- digit code and their original password.
  • They should use the username format: LAN\first.lastname together with their original password and the next 6-digit code displayed when the token button is depressed.

Answer :They should use the username format: [email protected], together with a password and their 6-digit code.

BR0-003 CompTIA A+ 2009 Edition Bridge Practice Exam Set 4

An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to the third party. Which of the following solutions will address the enterprise requirements?


Options are :

  • Using a HSM at the network perimeter to handle network device access
  • Implementing federated network access with the third party
  • Using a VPN concentrator which supports dual factor via hardware tokens.
  • Implementing 802.1x with EAP-TTLS across the infrastructure

Answer :Implementing 802.1x with EAP-TTLS across the infrastructure

An administrator is tasked with securing several website domains on a web server. The administrator elects to secure www.example.com, mail.example.org, archive.example.com, and www.example.org with the same certificate. Which of the following would allow the administrator to secure those domains with a single issued certificate?


Options are :

  • Subject Alternative Names Certificate
  • EV x509 Certificate
  • Wildcard Certificate
  • Intermediate Root Certificate

Answer :Subject Alternative Names Certificate

A company is deploying a new iSCSI-based SAN. The requirements are as follows: SAN nodes must authenticate each other. Shared keys must NOT be used. Do NOT use encryption in order to gain performance. Which of the following design specifications meet all the requirements? (Select TWO).


Options are :

  • Targets use CHAP authentication
  • Fiber channel should be used with AES
  • Targets have SCSI IDs for authentication
  • Initiators and targets use CHAP authentication
  • IPSec using AH with PKI certificates for authentication

Answer :Initiators and targets use CHAP authentication IPSec using AH with PKI certificates for authentication

220-802 CompTIA A+ Certification Practice Exam Set 1

Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?


Options are :

  • Storage multipaths
  • LUN masking
  • Deduplication
  • Data snapshots

Answer :LUN masking

ABC Company must achieve compliance for PCI and SOX. Which of the following would BEST allow the organization to achieve compliance and ensure security? (Select THREE).


Options are :

  • Establish a list of users that must work with each regulation
  • Compartmentalize the network
  • Establish a list of devices that must meet each regulation
  • Centralize management of all devices on the network
  • Apply technical controls to meet compliance with the regulation

Answer :Compartmentalize the network Establish a list of devices that must meet each regulation Apply technical controls to meet compliance with the regulation

A security administrator is tasked with implementing two-factor authentication for the company VPN. The VPN is currently configured to authenticate VPN users against a backend RADIUS server. New company policies require a second factor of authentication, and the Information Security Officer has selected PKI as the second factor. Which of the following should the security administrator configure and implement on the VPN concentrator to implement the second factor and ensure that no error messages are displayed to the user during the VPN connection? (Select TWO).


Options are :

  • The user certificate private key must be signed by the CA.
  • The CA certificate public key must be installed on the VPN concentrator.
  • The CA certificate private key must be installed on the VPN concentrator.
  • The user's certificate private key must be installed on the VPN concentrator.
  • The VPN concentrator's certificate private key must be installed on the VPN concentrator.

Answer :The CA certificate public key must be installed on the VPN concentrator. The VPN concentrator's certificate private key must be installed on the VPN concentrator.

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 7

A pentester must attempt to crack passwords on a windows domain that enforces strong complex passwords. Which of the following would crack the MOST passwords in the shortest time period?


Options are :

  • Online password testing
  • Dictionary attack
  • Rainbow tables attack
  • Brute force attack

Answer :Rainbow tables attack

Due to a new regulatory requirement, ABC Company must now encrypt all WAN transmissions. When speaking with the network administrator, the security administrator learns that the existing routers have the minimum processing power to do the required level of encryption. Which of the following solutions minimizes the performance impact on the router?


Options are :

  • Install an SSL acceleration appliance
  • Deploy inline network encryption devices
  • Require all core business applications to use encryption
  • Add an encryption module to the router and configure IPSec

Answer :Deploy inline network encryption devices

Joe, the Chief Executive Officer (CEO), was an Information security professor and a Subject Matter Expert for over 20 years. He has designed a network defense method which he says is significantly better than prominent international standards. He has recommended that the company use his cryptographic method. Which of the following methodologies should be adopted?


Options are :

  • The company should use the CEO?s encryption scheme.
  • The company should use a mixture of both systems to meet minimum standards.
  • The company should develop an in-house solution and keep the algorithm a secre
  • The company should use the method recommended by other respected information security organizations.

Answer :The company should use the method recommended by other respected information security organizations.

CompTIA JK0-022 Security Cryptography Certification Exam Set 7

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions