CompTIA JK0-015 E2C Security+ Certification Practice Test Set 12

Which of the following account policies would be enforced if a user tried to log into their account several times and was disabled for a set amount of time?


Options are :

  • Expiration
  • Disablement
  • Recovery
  • Lockout

Answer : Lockout

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 5

Which of the following is the MOST secure wireless protocol?


Options are :

  • CCMP
  • TKIP
  • WEP
  • WPA

Answer : CCMP

Which of the following is true when a user browsing to an HTTPS site receives the message: a€?The site’s certificate is not trusted’?


Options are :

  • The certificate has expired and was not renewed.
  • The CA is not in the default CRL.
  • The intermediate CA was taken offline.
  • The CA is not in the browser’s root authority list.

Answer : The CA is not in the browser’s root authority list.

Which of the following protocols should be used to ensure that the data remains encrypted during transport over the Internet? (Select THREE).


Options are :

  • SSL
  • TFTP
  • FTP
  • HTTP
  • TSL
  • SSH

Answer : SSL TSL SSH

Which of the following increases the key space of a password the MOST?


Options are :

  • 25 or more alpha-numeric characters
  • Letters, numbers, and special characters
  • Two-factor authentication
  • Sequential alpha-numeric patterns

Answer : Letters, numbers, and special characters

During business continuity planning, it is determined that a critical application can have no more than one hour of recovery time. Which of the following will be needed to meet this objective?


Options are :

  • Hot site
  • Cold site
  • Warm site
  • Off-site storage

Answer : Hot site

Which of the following can be implemented that will only prevent viewing the home screen on a mobile device if left momentarily unattended?


Options are :

  • Screen lock
  • Whole disk encryption
  • Cable lock
  • Remote wipe

Answer : Screen lock

220-802 CompTIA A+ Certification Practice Exam Set 1

Which of the following mitigation strategies is established to reduce risk when performing updates to business critical systems?


Options are :

  • Change management
  • Incident management
  • Server clustering
  • Forensic analysis

Answer : Change management

Which of the following is the MOST effective method to provide security for an in-house created application during software development?


Options are :

  • Third-party black box testing of the completed application before it goes live
  • Third-party white box testing of the completed application before it goes live
  • Ensure an application firewall protects the application
  • Explicitly include security gates during the SDLC

Answer : Explicitly include security gates during the SDLC

Which of the following controls would the security administrator implement if clients have to use at least ten upper and lower case alpha-numeric characters and special symbols?


Options are :

  • Account disablement
  • File encryption strength
  • Password complexity
  • Username lockout

Answer : Password complexity

In which of the following locations would a forensic analyst look to find a hooked process?


Options are :

  • BIOS
  • RAM
  • Rootkit
  • Slack space

Answer : RAM

Which of the following security controls should be implemented if an account was created for a temporary user that will only be employed for the next four months?


Options are :

  • Complexity
  • Lockout
  • Expiration
  • Disablement

Answer : Expiration

A security administrator is researching the main difference between TACACS and TACACS+ before deciding which one to install. The administrator has discovered that:


Options are :

  • TACACS+ uses TCP while TACACS can use either TCP or UDP.
  • TACACS can only be used on switches and routers while TACACS+ supports firewalls as well.
  • TACACS uses IPX and TACACS+ only supports IP.
  • TACACS does not encrypt authentication while TACACS+ does.

Answer : TACACS+ uses TCP while TACACS can use either TCP or UDP.

CD0-001 CDIA+ Certification Practice Exam Set 1

An online book review forum is being designed for anonymous customers to share feedback with other potential readers. The intention for the forum is to integrate into an existing online bookstore in order to boost sales. Which of the following BEST represents the expected level of confidentiality, integrity, and availability needed for the forum content that has been contributed by users?


Options are :

  • Low confidentiality, low integrity, low availability
  • High confidentiality, high integrity, low availability
  • High confidentiality, high integrity, high availability
  • Low confidentiality, medium to high integrity, medium availability

Answer : Low confidentiality, medium to high integrity, medium availability

Which of the following is BEST described as a scenario where organizational management decides not to provide a service offering because it presents an unacceptable risk to the organization?


Options are :

  • Acceptance
  • Avoidance
  • Mitigation
  • Deterrence

Answer : Avoidance

When granting access, which of the following protocols uses multiple-challenge responses for authentication, authorization and audit?


Options are :

  • TACACS
  • RADIUS
  • LDAP
  • TACACS+

Answer : TACACS+

Which of the following describes why the sender of an email may encrypt the email with a private key?


Options are :

  • Confidentiality
  • Non-repudiation
  • Transport encryption
  • Transmission speed

Answer : Non-repudiation

A technician must configure a network device to allow only certain protocols to the external servers and block requests to other internal sources. This is an example of a:


Options are :

  • layer 2 switch.
  • demilitarized zone.
  • stateful firewall.
  • load balancer.

Answer : stateful firewall.

An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?


Options are :

  • Web security gateway
  • Software based firewall
  • Mandatory Access Control (MAC)
  • VPN concentrator

Answer : VPN concentrator

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 6

Which of the following network ACL entries BEST represents the concept of implicit deny?


Options are :

  • Deny TCP any
  • Deny UDP any
  • Deny ANY any
  • Deny FTP any

Answer : Deny ANY any

Which of the following should be used to help prevent device theft of unused assets?


Options are :

  • HSM device
  • Locking cabinet
  • GPS tracking
  • Device encryption

Answer : Locking cabinet

In high traffic areas, security guards need to be MOST concerned about which of the following attacks?


Options are :

  • Shoulder surfing
  • Tailgating
  • Blue jacking
  • War driving

Answer : Tailgating

Which of the following should be integrated into the fire alarm systems to help prevent a fire from spreading?


Options are :

  • Humidity controls
  • HVAC
  • Thermostats
  • Video monitoring

Answer : HVAC

Which of the following BEST explains the security benefit of a standardized server image?


Options are :

  • Mandated security configurations have been made to the operating system.
  • Operating system license use is easier to track.
  • Anti-virus software will be installed and current
  • All current security updates for the operating system will have already been applied.

Answer : Mandated security configurations have been made to the operating system.

Which of the following is MOST likely to reduce the threat of a zero day vulnerability?


Options are :

  • Disabling unnecessary services
  • Patch management
  • Network-based intrusion detection system
  • Host-based intrusion detection system

Answer : Disabling unnecessary services

Which of the following should be checked for when conducting a wireless audit? (Select TWO)


Options are :

  • URL filtering
  • Open relays
  • Antenna placement
  • Open proxies
  • Encryption of wireless traffic

Answer : Antenna placement Encryption of wireless traffic

A security administrator has recently performed a detailed datacenter inventory of all hardware and software. This analysis has resulted in identifying a lot of wasted resources. Which of the following design elements would eliminate the wasted resources and improve the datacenter’s footprint?


Options are :

  • Hosted IP Centrex
  • . Remote access implementation
  • NAC
  • Virtualization

Answer : Virtualization

SY0-401 CompTIA Security+ Certification Practice Exam Set 6

A business-critical application will be installed on an Internet facing server. Which of the following is the BEST security control that should be performed in conjunction with updating the application to the MOST current version?


Options are :

  • A port scan should be run against the application’s server
  • The firewall should be configured to prevent the application from auto-updating
  • Vendor-provided hardening documentation should be reviewed and applied.
  • The firewall should be configured to allow the application to auto-update.

Answer : Vendor-provided hardening documentation should be reviewed and applied.

Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?


Options are :

  • Error and exception handling
  • SQL injection
  • LDAP injection
  • Cross-site scripting

Answer : Cross-site scripting

Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems, the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to identify the issue?


Options are :

  • Data integrity check
  • Vulnerability scan
  • Penetration testing
  • Hardware baseline review

Answer : Vulnerability scan

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions