CompTIA JK0-015 E2C Security+ Certification Practice Test Set 14

Which of the following can be deployed to provide secure tunneling services?


Options are :

  • DNSSEC
  • SNMPv2
  • SNMPv3
  • IPv6

Answer : IPv6

Which of the following is an example of requiring users to have a password of 16 characters or more?


Options are :

  • Password complexity requirements
  • Password length requirements
  • Password recovery requirements
  • Password expiration requirements

Answer : Password length requirements

Which of the following MOST likely occurs when a user discovers a packet capture attack on a computer connected to a wireless network?


Options are :

  • Invalid checksums
  • Large dump files
  • Sequence numbers
  • . Header manipulation

Answer : Large dump files

220-701 A+ Essentials Certification Practice Exam Set 7

A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?


Options are :

  • Change the server’s SSL key and add the previous key to the CRL.
  • Add input validation to forms.
  • Install a host-based firewall.
  • Install missing security updates for the operating system.

Answer : Add input validation to forms.

A system administrator could have a user level account and an administrator account to prevent:


Options are :

  • escalation of privileges.
  • implicit deny.
  • administrative account lockout.
  • password sharing.

Answer : escalation of privileges.

Which of the following is MOST likely used to secure the creation of cryptographic keys?


Options are :

  • Common access card
  • Trusted platform module
  • One-time pad
  • Hashing algorithm

Answer : Trusted platform module

Which of the following is an example of allowing a user to perform a self-service password reset?


Options are :

  • Password recovery
  • Password length
  • Password expiration
  • Password complexity

Answer : Password recovery

A Black Box assessment of an application is one where the security assessor has:


Options are :

  • no access to the source code but access to the development documentation.
  • no access to the application’s source code and development documentation.
  • access to the source code and the development documentation.
  • access to the UAT documentation but not the source code.

Answer : no access to the application’s source code and development documentation.

Which of the following technologies is often used by attackers to hide the origin of an attack?


Options are :

  • URL filtering
  • Open proxy
  • Load balancer
  • Flood guard

Answer : Open proxy

220-702 CompTIA A+ Practical Application Practice Exam Set 12

A company needs to reduce the risk of employees emailing confidential data outside of the company. Which of the following describes an applicable security control to mitigate this threat?


Options are :

  • Implement transport encryption
  • nstall a network-based DLP device
  • Prevent the use of USB drives
  • Configure the firewall to block port 110

Answer : nstall a network-based DLP device

If a security administrator is reviewing a JPEG’s metadata and hash against an unverified copy of the graphic, which of the following is the administrator looking for?


Options are :

  • Chain of custody
  • Digital signatures
  • Whole disk encryption
  • Steganography

Answer : Steganography

Which of the following is susceptible to reverse lookup attacks if not configured properly?


Options are :

  • IPSec
  • SSL
  • ICMP
  • DNS

Answer : DNS

Which of the following appears to the user as a legitimate site but is in fact an attack from a malicious site?


Options are :

  • XSS
  • DoS
  • Phishing
  • XSRF

Answer : XSRF

Which of the following logs would show that someone has been querying information about a Company's networks?


Options are :

  • System logs for patch and reboot events
  • Application logs for service start and stop events
  • . DNS logs for zone transfers
  • Security logs for failed logon attempts

Answer : . DNS logs for zone transfers

In the event of a fire, the MOST appropriate setting for electronic cipher locks would be to:


Options are :

  • allow personnel to exit the building only after security confirms the threat and electronically releases all locks.
  • allow personnel to exit the building only after using a valid swipe card and key.
  • allow personnel to exit the building without any forms of authentication.
  • allow personnel to exit the building using only a photo ID badge

Answer : allow personnel to exit the building without any forms of authentication.

Which of the following helps protect logs from compromise?


Options are :

  • Turn on all logging options.
  • Log failed logon attempts
  • View logs regularly
  • Centralize log management.

Answer : Centralize log management.

Which of the following BEST describes the use of geographically distinct nodes to flood a site or sites with an overwhelming volume of network traffic?


Options are :

  • Spoofing
  • DoS
  • Replay
  • DDoS

Answer : DDoS

CA1-001 CompTIA Advanced Security Practitioner Practice Exam Set 3

In which of the following would a user find a list of activities which are prohibited when connecting to a corporate network?


Options are :

  • Acceptable use policy
  • Network procedures
  • Privacy policy
  • Due diligence

Answer : Acceptable use policy

In which of the following situations is a web application firewall MOST likely used?


Options are :

  • Communication between DNS servers needs to be encrypted.
  • Physical access to a console needs to be secured.
  • Input to an application needs to be screened for malicious content.
  • External requests to UDP port 445 needs to be blocked.

Answer : Input to an application needs to be screened for malicious content.

The company's administrative assistant acts as the main point of contact for outside sales vendors and provides information over the phone. Which of the following is the GREATEST threat that the administrative assistant should be educated about?


Options are :

  • Non-redundant personnel role distribution
  • Providing the corporate mailing address to unidentified callers
  • Providing employee personal contact information
  • Data information verification and up-to-date reporting structure

Answer : Providing employee personal contact information

Which of the following ensures that an employee cannot continue carrying out fraudulent activities?


Options are :

  • Two-factor authentication
  • Biometric reader
  • Role-based access control
  • Job rotation

Answer : Job rotation

Which of the following is MOST often used in a DDoS?


Options are :

  • Worm
  • Virus
  • Botnet
  • Trojan

Answer : Botnet

After a recent viral intrusion, an administrator wishes to verify the servers functionality post-clean-up. The administrator should:


Options are :

  • ensure that the antivirus applications definitions are up-to-date.
  • compare the systems performance against the configuration baseline.
  • analyze the NIDS logs for any errant connections that may have been recorded.
  • install any hotfixes that may have been overlooked.

Answer : compare the systems performance against the configuration baseline.

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 9

The company's new administrative assistant wants to use their name as a password and asks if it is appropriate. Which of the following is the BEST reason for not allowing this?


Options are :

  • The proposed password does not meet complexity requirements.
  • The password risks disclosure of Personally Identifiable Information (PII).
  • . It will require too much time to conduct due diligence
  • Change management approval has not been granted.

Answer : The proposed password does not meet complexity requirements.

A company's laptops use whole disk encryption to encrypt their hard drives. A user lost their key and the technicians do not have a copy of the key. This resulted in the user losing all the data on their hard drive. Which of the following could have been implemented to prevent this situation?


Options are :

  • Digital signatures
  • Key escrow
  • Trusted Platform Module (TPM)
  • . Non-repudiation

Answer : Key escrow

Which of the following should a developer use to protect cookies while in transit?


Options are :

  • Proprietary formatting
  • Digital signing
  • Encryption
  • Protocol analyzer

Answer : Encryption

A library provides an administrator with criteria and keywords to prevent children from accessing certain websites. Which of the following would BEST accomplish this goal?


Options are :

  • Proxy server
  • Mandatory access control list
  • Internet content filter
  • Discretionary access control list

Answer : Internet content filter

Which of the following provides an organization with the ability to hide an internal private network, while simultaneously providing additional IP addresses?


Options are :

  • NAT
  • DMZ
  • VPN
  • VLAN

Answer : NAT

A new software application is designed to interact with the company's proprietary devices. Systems where the software is installed can no longer connect to the devices. Which of the following should the administrator do FIRST?


Options are :

  • Ensure that the software is compliant to the system's host OS.
  • Verify that the devices are not rogue machines and blocked by network policy.
  • Consult the firewall logs for blocked process threads or port communication.
  • Check the antivirus definitions for false positives caused by the new software.

Answer : Consult the firewall logs for blocked process threads or port communication.

CompTIA CA1-001 Advanced Security Practitioner Practice Exam Set 6

Which of the following is the reason fiber optic cable is MORE secure than CAT5 cable?


Options are :

  • It has heavier shielding
  • Enforcing change management
  • It transmits signals faster.
  • Data is automatically encrypted.

Answer : Enforcing change management

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions