CompTIA JK0-015 E2C Security+ Certification Practice Test Set 1

Which of the following technologies is used to verify that a file was not altered?

Options are :

  • MD5
  • DES
  • AE5
  • RC5

Answer : MD5

Which of the following ports are used for NetBIOS by default? (Select TWO).

Options are :

  • 135
  • 443
  • 139
  • 143
  • 445

Answer : 139 445

Which of the following is an example of obtaining unauthorized information by means of casual observation?

Options are :

  • Shoulder surfing
  • War driving
  • Whaling
  • Dumpster diving

Answer : Shoulder surfing

IPSec has been chosen for remote access VPN connections for telecommuters. Which of the following combinations would BEST secure the connection?

Options are :

  • Transport mode, ESP
  • Transport mode, AH
  • Tunnel mode, AH
  • Tunnel mode, ESP

Answer : Tunnel mode, ESP

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 1

Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?

Options are :

  • Shoulder surfing
  • Tailgating
  • Impersonation
  • Evil twin

Answer : Tailgating

An offsite location containing the necessary hardware without data redundancy would be an example of which of the following off-site contingency plans?

Options are :

  • Cluster
  • Warm site
  • Cold site
  • Hot site

Answer : Warm site

User awareness training about proper disclosure of information, handling of corporate data, and security policies is important due to the popularity of which of the following?

Options are :

  • Virtual private networks
  • Wireless networks
  • Social networking sites
  • Zero day exploits

Answer : Social networking sites

Which of the following business continuity activities would a company implement in order to restore a critical system after a disruption or failure?

Options are :

  • Continuity of day to day operations
  • Succession planning
  • Business continuity testing
  • Disaster recovery

Answer : Disaster recovery

Which of the following devices is typically used at the enclave boundary to inspect, block, and re-route network traffic for security purposes?

Options are :

  • Firewalls
  • Protocol analyzers
  • Load balancers
  • Spam filter

Answer : Firewalls

Webmail is classified under which of the following cloud-based technologies?

Options are :

  • Demand Computing
  • Software as a Service (SaaS)
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)

Answer : Software as a Service (SaaS)

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 1

Which of the following is the technical implementation of a security policy?

Options are :

  • Flood guards
  • Firewall rules
  • Cloud computing
  • VLAN

Answer : Firewall rules

A technician needs to allow seven specific users connection to a new access point. Which of the following should be performed to achieve this action?

Options are :

  • Enable MAC filtering
  • Adjust antenna placement
  • Disable SSID broadcast
  • Decrease WAP power levels

Answer : Enable MAC filtering

Which of the following is the MOST secure method of utilizing FTP?

Options are :

  • FTPS
  • FTP active
  • FTP passive
  • SCP

Answer : FTPS

A security administrator must implement AES encryption throughout a company’s wireless network. Which of the following MUST be configured?

Options are :

  • WPA
  • TKIP
  • CCMP
  • 802.11n

Answer : CCMP

Which of the following is the MOST appropriate risk mitigation strategy to use in order to identify an unauthorized administrative account?

Options are :

  • Routine audits of system logs
  • User rights and permissions review
  • Incident management
  • Change management

Answer : User rights and permissions review

The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses:

Options are :

  • multiple keys for non-repudiation of bulk data.
  • bulk encryption for data transmission over fiber.
  • different keys on both ends of the transport medium.
  • the same key on each end of the transmission medium.

Answer : the same key on each end of the transmission medium.

JK0-802 CompTIA A+ Certification Exam Set 8

Which of the following concepts ensures that the data is only viewable to authorized users?

Options are :

  • Biometrics
  • Confidentiality
  • Availability
  • Integrity

Answer : Confidentiality

Information classification is used to protect which of the following?

Options are :

  • Clustering
  • Sensitive data
  • Phishing attacks
  • Best practices

Answer : Sensitive data

Which of the following will teach employees about malicious attempts from an attacker to obtain bank account information?

Options are :

  • Phishing techniques
  • Handling PII
  • Password complexity requirements
  • Tailgating techniques

Answer : Phishing techniques

Which of the following is used when performing a quantitative risk analysis?

Options are :

  • Asset value
  • Focus groups
  • Surveys
  • Best practice

Answer : Asset value

The MAIN difference between qualitative and quantitative risk assessment is:

Options are :

  • quantitative must be approved by senior management while qualitative is used within departments without specific approval.
  • quantitative is based on hard numbers while qualitative is based on subjective ranking.
  • quantitative is based on the number of assets while qualitative is based on the type of asset.
  • qualitative is used in small companies of 100 employees or less while quantitative is used in larger companies of 100 employees or more.

Answer : quantitative is based on hard numbers while qualitative is based on subjective ranking.

Which of the following is used in conjunction with PEAP to provide mutual authentication between peers?

Options are :

  • PPP
  • MSCHAPv1
  • MSCHAPv2
  • LEAP

Answer : MSCHAPv2

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 5

Which of the following stops malicious traffic from affecting servers?

Options are :

  • NIDS
  • NIPS
  • Sniffers
  • Protocol analyzers

Answer : NIPS

Which of the following systems implements a secure key distribution system that relies on hardcopy keys intended for individual sessions?

Options are :

  • One-time pads
  • Blowfish
  • PKI

Answer : One-time pads

Actively monitoring data streams in search of malicious code or behavior is an example of

Options are :

  • an Internet proxy.
  • load balancing
  • content inspection.
  • URL filtering.

Answer : content inspection.

Which of the following assists in identifying if a system was properly handled during transport?

Options are :

  • Take a device system image
  • Review network traffic and logs
  • Chain of custody
  • Track man hours and incident expense

Answer : Chain of custody

Which of the following prevents numerous SYN packets from being accepted by a device?

Options are :

  • Flood guards
  • Transport encryption
  • VLAN management
  • Implicit deny

Answer : Flood guards

A security administrator is in charge of a datacenter, a hot site and a cold site. Due to a recent disaster, the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensure is in place for a cold site?

Options are :

  • Location with all required equipment loaded with all current patches and updates
  • Location with duplicate systems found in the datacenter
  • Location near the datacenter that meets power requirements
  • Location that meets power and connectivity requirements

Answer : Location that meets power and connectivity requirements

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 1

Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?

Options are :

  • Firewall
  • Malware inspection
  • IDS
  • Spam filter

Answer : IDS

Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?

Options are :

  • VPN concentrator
  • Protocol analyzer
  • URL filter
  • Load balancer

Answer : Load balancer

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions