CompTIA JK0-015 E2C Security+ Certification Practice Test Set 16

Which of the following would be implemented to provide a check and balance against social engineering attacks?


Options are :

  • Single sign-on
  • Password policy
  • Biometric scanning
  • Separation of duties

Answer : Separation of duties

Implementing a mandatory vacation policy for administrators is a security best practice because of which of the following?


Options are :

  • Increases administrators skills by providing them with a vacation.
  • Detects malicious actions by an administrator responsible for reviewing logs.
  • Makes it easier to implement a job rotation policy and cross train administrators.
  • Detects malicious actions by users with remote access to network resources

Answer : Detects malicious actions by an administrator responsible for reviewing logs.

Which of the following cryptographic algorithms would be the MOST secure choice for encrypting email?


Options are :

  • PGP
  • TKIP
  • AES
  • 3DES

Answer : AES

Which of the following sits inline with network traffic and helps prevent malicious behavior as it occurs by either dropping packets or correcting TCP stream related issues?


Options are :

  • NIPS
  • NIDS
  • HIPS
  • HIDS

Answer : NIPS

A disaster recovery exercise should include which of the following action types?


Options are :

  • Creating a chain of custody
  • Enforcing change management
  • Testing the performance of each workstations UPS
  • Testing server restoration

Answer : Testing server restoration

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 7

If a user lost their private key, which of the following actions would an administrator need to take?


Options are :

  • Purchase a new CA
  • Redesign the PKI
  • Use a recovery agent
  • Obtain a public key

Answer : Use a recovery agent

Which of the following determines if traffic is blocked or allowed?


Options are :

  • Logical keys
  • Network-based Intrusion Detection System (NIDS)
  • Access Control List (ACL)
  • Username and passwords

Answer : Access Control List (ACL)

Which of the following is considered the MOST secure replacement for telnet?


Options are :

  • IPSec
  • L2TP
  • SSL
  • SSH

Answer : SSH

NIDS can be used to help secure a network from threats MOST effectively by watching network traffic in order to:


Options are :

  • ensure proper password strength
  • inspect and analyze data being passed through SSH tunnels.
  • observe if any systems are communicating using unauthorized protocols.
  • verify adequate bandwidth is being provided for existing traffic.

Answer : observe if any systems are communicating using unauthorized protocols.

Logs from a company's DNS server show requests from a remote ISPs DNS server for random sequences of characters as non-existent sub-domains to the legitimate domain name (e.g. 1357acef246.company.com). These logs MOST likely suggest the possibility of which of the following attacks?


Options are :

  • DNS poisoning
  • ARP poisoning
  • Domain name kiting
  • TCP/IP hijacking

Answer : DNS poisoning

To follow industry best practices for disaster recovery planning, an alternate site should be geographically:


Options are :

  • near to the primary site to reduce outage duration due to conveyance of primary site staff and hardware.
  • near to the primary site to ensure frequent inspection by the primary sites staff.
  • similar to the primary sites to ensure availability of resources and environmental functions.
  • distant from the primary site to decrease the likelihood of an event affecting both.

Answer : distant from the primary site to decrease the likelihood of an event affecting both.

220-702 CompTIA A+ Practical Application Practice Exam Set 5

Which of the following tools is MOST commonly used to assess a system's network for a security audit?


Options are :

  • Physical security control
  • Vulnerability scanner
  • Protocol analyzer
  • . Password cracker

Answer : Vulnerability scanner

Which of the following describes the characteristic of an anomaly-based IDS?


Options are :

  • Sending an alert when suspicious activity has been prevented from entering the network.
  • Comparing traffic and sending an alert when it differs from historical patterns
  • Sending an alert only when a pre-specified pattern is observed.
  • Detecting traffic for specific patterns of misuse and sending an alert for each incident.

Answer : Comparing traffic and sending an alert when it differs from historical patterns

A user can no longer access the Internet from their laptop. A technician checks the computer and realizes that it is sending out spam messages throughout the company. The computer is MOST likely the victim of which of the following security threats?


Options are :

  • Virus
  • Botne
  • XSS
  • DOS

Answer : Botne

Which of the following security concepts is supported by shielding?


Options are :

  • Confidentiality
  • Portability
  • Reliability
  • Availability

Answer : Confidentiality

Which of the following should an administrator make sure is disabled or changed prior to putting a device node into a live environment?


Options are :

  • Remote user accounts
  • Domain user accounts
  • Local user accounts
  • Default account

Answer : Default account

Which of the following is a weakness of single sign-on?


Options are :

  • Increased overhead for server processing
  • A single point of failure on the network
  • Requirement to remember one password
  • Multiple points of entry into the network

Answer : A single point of failure on the network

CompTIA Security+ SY0-501 Questions & Answers Set 2

Which of the following network security devices is the BEST to use when increasing the security of an entire network, or network segment, by preventing the transmission of malicious packets from known attacking sources?


Options are :

  • NIDS
  • Honeypo
  • Firewall
  • HIDS

Answer : Firewall

Which of the following tools is BEST suited to determine if an IDS has triggered a false positive?


Options are :

  • Netflow collector
  • Port scanne
  • Network mapper
  • Protocol analyze

Answer : Protocol analyze

Which of the following is used to verify if internal web servers are redirecting traffic to a malicious site?


Options are :

  • DNS record
  • Performance logs
  • Access logs
  • IDS

Answer : DNS record

A technician places a network jack in the parking garage for administrative use. Which of the following can be used to mitigate threats from entering the network via this jack?


Options are :

  • Install wireless access points
  • nstall a firewal
  • Replace CAT5 with CAT6 plenum
  • Disable ports when not in use

Answer : Disable ports when not in use

QUESTION NO: 167 Which of the following techniques embeds an encrypted message within the bits of an image file?


Options are :

  • Steganography
  • Proxy avoidance
  • Cryptographic hashing
  • Cipher-text attac

Answer : Steganography

Which of the following security applications would be MOST useful to traveling employees? (Select THREE).


Options are :

  • NIPS
  • Anti-spam
  • External corporate firewall
  • Personal software firewall
  • Personal software firewall
  • NIDS

Answer : Anti-spam Personal software firewall Personal software firewall

Mock : CompTIA A+ Certification 220-902

Which of the following defines the process and accounting structure for handling system upgrades and modifications?


Options are :

  • Service level agreement
  • Loss control
  • Key management
  • Change management

Answer : Change management

A user reports random windows opening and closing after installing new software. Which of the following has MOST likely infected the computer?


Options are :

  • Rootkit
  • Spam
  • Adware
  • Worm

Answer : Adware

A call center uses 50 remote representatives to handle calls for clients. The representatives run software based IP phones on their laptops, and connect back to the call center over the Internet. However, one of the representatives reports that they can no longer connect to the call center PBX. Which of the following is the reason that only this call center representative is unable to connect to the PBX?


Options are :

  • The representative has a disk defragmentation program installed.
  • The call center has recently installed HIDS.
  • The representative has a mis-configured software firewall.
  • The call center has placed the firewall on the edge of the network

Answer : The representative has a mis-configured software firewall.

Which of the following allows an attacker to join a network and view traffic on the network by physical connection?


Options are :

  • Vampire tap
  • IDS
  • IPS
  • . Firewall

Answer : Vampire tap

In order to closely monitor and detect suspicious activity on a single server, which of the following should be used?


Options are :

  • NIDS
  • Software firewall
  • HIDS
  • Group policies

Answer : HIDS

Which of the following poses the GREATEST risk of data leakage?


Options are :

  • BIOS
  • Thin client
  • USB drive
  • 802.1x

Answer : USB drive

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 6

Which of the following is able to detect that a local system has been compromised?


Options are :

  • . Personal firewall
  • Anti-spam
  • HIDS
  • NIDS

Answer : HIDS

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions