CompTIA CySA+ Set 10

SaraÂ’s organization has a well-managed test environment. What is the most likely issue that Sara will face when attempting to evaluate the impact of a vulnerability remediation by first deploying it in the test environment?


Options are :

  • Test systems are not available for all production systems.
  • Production systems require a different type of patch than test systems.
  • Significant configuration differences exist between test and production systems.
  • Test systems are running different operating systems than production systems.

Answer :Test systems are not available for all production systems.

How many vulnerabilities listed in the report shown here are significant enough to warrant immediate remediation in a typical operating environment?



Options are :

  • 22
  • 14
  • 5
  • 0

Answer :0

LX0-104 CompTIA Linux+ [Powered by LPI] Exam Set 2

Laura discovered an operating system vulnerability on a system on her network. After tracing the IP address, she discovered that the vulnerability is on a search appliance installed on her network. She consulted with the responsible engineer who informed her that he has no access to the underlying operating system. What is the best course of action for Laura?


Options are :

  • Contact the vendor to obtain a patch.
  • Try to gain access to the underlying operating system and install the patch.
  • Mark the vulnerability as a false positive.
  • Wait 30 days and rerun the scan to see whether the vendor corrected the vulnerability.

Answer :Contact the vendor to obtain a patch.

Which one of the following types of data is subject to regulations in the United States that specify the minimum frequency of vulnerability scanning?


Options are :

  • DriverÂ’s license numbers
  • Insurance records
  • Credit card data
  • Medical records

Answer :Credit card data

Jim is responsible for managing his organizationÂ’s vulnerability scanning program. He is experiencing issues with scans aborting because the previous dayÂ’s scans are still running when the scanner attempts to start the current dayÂ’s scans. Which one of the following solutions is least likely to resolve JimÂ’s issue?


Options are :

  • Add a new scanner.
  • Reduce the scope of the scans.
  • Reduce the sensitivity of the scans.
  • Reduce the frequency of the scans.

Answer :Reduce the sensitivity of the scans.

Comptia A+ (220-801) Certification Exam Practice Test Set 2

Trevor is working with an application team on the remediation of a critical SQL injection vulnerability in a public-facing service. The team is concerned that deploying the fix will require several hours of downtime and that will block customer transactions from completing. What is the most reasonable course of action for Trevor to suggest?


Options are :

  • Wait until the next scheduled maintenance window.
  • Demand that the vulnerability be remediated immediately.
  • Schedule an emergency maintenance for an off-peak time later in the day.
  • Convene a working group to assess the situation.

Answer :Schedule an emergency maintenance for an off-peak time later in the day.

While conducting a vulnerability scan of his organizationÂ’s data center, Renee discovers that the management interface for the organizationÂ’s virtualization platform is exposed to the scanner. In typical operating circumstances, what is the proper exposure for this interface?


Options are :

  • Internet
  • Internal networks
  • No exposure
  • Management network

Answer :Management network

Richard is designing a remediation procedure for vulnerabilities discovered in his organization. He would like to make sure that any vendor patches are adequately tested prior to deploying them in production. What type of environment could Richard include in his procedure that would best address this issue?


Options are :

  • Sandbox
  • Honeypot
  • Honeynet
  • Production

Answer :Sandbox

CompTIA JK0-801 A+ Certification Part – 2 Practice Exam Set 4

Becky is scheduling vulnerability scans for her organizationÂ’s data center. Which one of the following is a best practice that Becky should follow when scheduling scans?


Options are :

  • Schedule scans so that they are spread evenly throughout the day.
  • Schedule scans so that they run during periods of low activity.
  • Schedule scans so that they all begin at the same time.
  • Schedule scans so that they run during periods of peak activity to simulate performance under load.

Answer :Schedule scans so that they run during periods of low activity.

Given the CVSS information shown here, where would an attacker need to be positioned on the network to exploit this vulnerability?



Options are :

  • The attacker must have a local administrator account on the vulnerable system.
  • The attacker must have a local account on the vulnerable system but does not necessarily require administrative access.
  • The attacker must have access to the local network.
  • The attacker may exploit this vulnerability remotely without an account on the system.

Answer :The attacker may exploit this vulnerability remotely without an account on the system.

During the reconnaissance stage of a penetration test, Fred calls a number of staff at the target organization. Using a script he prepared, Fred introduces himself as part of the support team for their recently installed software and asks for information about the software and its configuration. What is this technique called?


Options are :

  • Pretexting
  • OSINT
  • A tag-out
  • Profiling

Answer :Pretexting

CompTIA JK0-801 A Laptop Printer and Operating certify Exam Set 1

Geoff needs to lock down a Windows workstation that has recently been scanned using nmap with the results shown here. He knows that the workstation needs to access websites and that the system is part of a Windows domain. What ports should he allow through the systemÂ’s firewall for externally initiated connections?


Options are :

  • 80, 135, 139, and 445
  • 80, 445, and 3389
  • 135, 139, and 445
  • No ports should be open.

Answer :No ports should be open.

Lucca wants to identify systems that may have been compromised and are being used for data exfiltration. Which of the following technologies should he put into place to capture data that he can analyze using his SIEM to find this behavior?


Options are :

  • A firewall
  • A netflow collector
  • A honeypot
  • A BGP monitor

Answer :A netflow collector

During a white-box penetration test, Luke finds that he is suddenly unable to connect to the target network. What has likely happened?


Options are :

  • Automated shunning
  • Network link failure
  • Back-off algorithms
  • A BGP route change

Answer :Automated shunning

220-701 A+ Essentials Certification Practice Exam Set 1

AdamÂ’s port scan returns results on six TCP ports: 22, 80, 443, 515, 631, and 9100. If Adam needs to guess what type of device this is based on these ports, what is his best guess?


Options are :

  • A web server
  • An FTP server
  • A printer
  • A proxy server

Answer :A printer

Cassandra believes that attackers were able to extract a volume shadow copy of a workstation belonging to her organizationÂ’s Windows domain administrator. What information should she not report as being potentially exposed?


Options are :

  • All files on the userÂ’s desktop
  • Password hashes
  • Domain details
  • Plain-text Windows account passwords

Answer :Plain-text Windows account passwords

Lauren is contacted by a concerned administrator who notes that almost all of their Windows 10 Enterprise workstations are reporting the following issue after a patch deployment. What important policy may be missing?


Options are :

  • Active hours
  • Required reboots
  • Automatic updates
  • Network time synchronization

Answer :Required reboots

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 6

Jarett needs to protect an application server against resource exhaustion attacks. Which of the following techniques is best suited to surviving a large-scale DDoS attack?


Options are :

  • Enable application sharding.
  • Review each query and implement query optimization.
  • Implement aggressive aging at the organizationÂ’s firewall.
  • Employ a CDN.

Answer :Employ a CDN.

In his role as the SOC operator, Frank regularly scans a variety of servers in his organization. After two months of reporting multiple vulnerabilities on a Windows file server, Frank recently escalated the issue to the server administratorÂ’s manager.

At the next weekly scan window, Frank noticed that all of the vulnerabilities were no longer active; however, ports 137, 139, and 445 were still showing as open. What most likely happened?


Options are :

  • The server administrator blocked the scanner with a firewall.
  • The server was patched.
  • The vulnerability plug-ins were updated and no longer report false positives.
  • The system was offline.

Answer :The server was patched.

While conducting reconnaissance, Greg discovers what he believes is an SMTP service running on an alternate port. What technique should he use to manually validate his guess?


Options are :

  • Send an email via the open port.
  • Send an SMTP probe.
  • telnet to the port.
  • ssh to the port.

Answer :telnet to the port.

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 9

Adam is reviewing his organizationÂ’s security footprint by conducting reconnaissance activities. After reviewing a list of Google dorks, he runs the following search:

"mysqli_connect" ext:inc

If it returns data, what should he recommend in his report to management?


Options are :

  • Block MySQL connections from remote hosts.
  • Initiate the organizationÂ’s incident response process.
  • Immediately change MySQL passwords and review configurations.
  • Change all MySQL connection strings.

Answer :Immediately change MySQL passwords and review configurations.

RickÂ’s manager wants to present the most trustworthy certificate possible for a website. What type of certificate should Rick get?


Options are :

  • EV
  • DV
  • OV
  • IV

Answer :EV

While reviewing web server logs, Danielle notices the following entry. What occurred?

10.11.210.6 - GET /wordpress/wp-admin/theme-editor.php?file=404.php&theme= total 200


Options are :

  • A theme was changed.
  • A file was not found.
  • There was an attempt to edit the 404 page.
  • The 404 page was displayed.

Answer :There was an attempt to edit the 404 page.

220-701 A+ Essentials Certification Practice Exam Set 9

While reviewing his Apache logs, Charles discovers the following entry. What has occurred?

10.1.1.1 - - [27/Jun/2017:11:42:22 -0500] "GET

/query.php?searchterm=stuff&%20lid=1%20UNION%20SELECT%200,username,user_id,password,

name,%20email,%20FROM%20users HTTP/1.1" 200 9918 "-" "Mozilla/4.0 (compatible; MSIE

6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)"


Options are :

  • A successful database query
  • A PHP overflow attack
  • A SQL injection attack
  • An unsuccessful database query

Answer :A SQL injection attack

What two pieces of information does nmap need to estimate network path distance?


Options are :

  • IP address and TTL
  • TTL and operating system
  • Operating system and BGP flags
  • TCP flags and IP address

Answer :TTL and operating system

Charles needs to make sure he has found the correct social media profile for a target of his OSINT process. Which of the following includes the three critical items needed to uniquely identify the majority of Americans?


Options are :

  • Height, weight, and eye color
  • Date of birth, gender, and zip code
  • Zodiac sign, gender, and zip code
  • Age, height, and weight

Answer :Date of birth, gender, and zip code

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 16

While reviewing logs from users with root privileges on an administrative jump box, Alex discovers the following suspicious command:

nc -l -p 43501 < example.zip

What happened?


Options are :

  • The user set up a reverse shell running as example.zip.
  • The user set up netcat as a listener to push example.zip.
  • The user set up a remote shell running as example.zip.
  • The user set up netcat to receive example.zip.

Answer :The user set up netcat as a listener to push example.zip.

During an on-site penetration test of a small business, Bob scans outward to a known host to determine the outbound network topology. What information can he gather from the results provided by Zenmap?


Options are :

  • There are two nodes on the local network.
  • There is a firewall at IP address 96.120.24.121.
  • There is an IDS at IP address 96.120.24.121.
  • He should scan the 10.0.2.0/24 network.

Answer :He should scan the 10.0.2.0/24 network.

Chris discovers the following entries in /var/log/auth.log. What is most likely occurring?

Aug 6 14:13:00 demo sshd[5279]: Failed password for root from 10.11.34.11 port 38460 ssh2

Aug 6 14:13:00 demo sshd[5275]: Failed password for root from 10.11.34.11 port 38452 ssh2

Aug 6 14:13:00 demo sshd[5284]: Failed password for root from 10.11.34.11 port 38474 ssh2

Aug 6 14:13:00 demo sshd[5272]: Failed password for root from 10.11.34.11 port 38446 ssh2

Aug 6 14:13:00 demo sshd[5276]: Failed password for root from 10.11.34.11 port 38454 ssh2

Aug 6 14:13:00 demo sshd[5273]: Failed password for root from 10.11.34.11 port 38448 ssh2

Aug 6 14:13:00 demo sshd[5271]: Failed password for root from 10.11.34.11 port 38444 ssh2

Aug 6 14:13:00 demo sshd[5280]: Failed password for root from 10.11.34.11 port 38463 ssh2

Aug 6 14:13:01 demo sshd[5302]: Failed password for root from 10.11.34.11 port 38478 ssh2

Aug 6 14:13:01 demo sshd[5301]: Failed password for root from 10.11.34.11 port 38476 ssh2


Options are :

  • A user has forgotten their password.
  • A brute-force attack against the root account
  • A misconfigured service
  • A denial-of-service attack against the root account

Answer :A brute-force attack against the root account

CompTIA Cloud Essentials CLO-001 Certified Practice Exam Set 1

As part of his reconnaissance effort, Charles uses the following Google search string:

"authentication failure; logname=" ext:log;site:example.com

What will he find if he receives results from his targetÂ’s domain?


Options are :

  • A list of successful logins
  • A list of log names
  • A list of failed logins
  • A list of log files

Answer :A list of failed logins

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions