CompTIA JK0-015 E2C Security+ Certification Practice Test Set 17

In the past several weeks, there have been an increased amount of failed remote desktop login attempts from an external IP address. Which of the following ports should the administrator change from its default to control this?


Options are :

  • 3389 (Correct)
  • 4658
  • 25
  • 21

Answer : 3389

The technical user group has read and writes access to a network share. The executive user group has full control of the same network share. A user is a member of both groups. Which of the following BEST describes the user's permissions on the share?


Options are :

  • The user is able to modify, write, delete and read documents in network share. (Correct)
  • The user is able to write and read documents in the network share.
  • The user is able to modify, write and delete documents in network share.
  • The user is able to modify and write documents in network share

Answer : The user is able to modify, write, delete and read documents in network share.

An important file has been deleted off the departments file server. Management would like to know who was responsible for deleting the file. Which of the following log files can be used to inform management of the answer?


Options are :

  • The application logs on the server and then the access logs on the workstation
  • The system logs on the server and then the access logs on the workstation
  • The access logs on the server and then the access logs on the workstation. (Correct)
  • The access logs on the server and then the system logs on the workstation.

Answer : The access logs on the server and then the access logs on the workstation.

Which of the following is the BEST reason why a security administrator should periodically get a list of current employees and positions from the Human Resource department?


Options are :

  • To disable the accounts of employees who have move to a different department (Correct)
  • To immediately create accounts for new employees
  • To update the employee directory with new offices and phone numbers C. To ensure all users have the appropriate access

Answer : To disable the accounts of employees who have move to a different department

Exploitation of the 5-day grace period for domain name registration is referred to as:


Options are :

  • domain name poisoning.
  • omain name lookup.
  • domain name service.
  • domain name kiting. (Correct)

Answer : domain name kiting.

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 21

Which of the following symmetric encryption algorithms provides the HIGHEST key strength?


Options are :

  • 3DES
  • Elliptic curve
  • RSA
  • AES (Correct)

Answer : AES

Which of the following security applications would an administrator use to help reduce the amount of bandwidth used by web browsing


Options are :

  • HIDS
  • Proxy server (Correct)
  • NIPS
  • Personal software firewall

Answer : Proxy server

Which of the following security applications can be implemented to mitigate port scanning attacks from the Internet?


Options are :

  • Pop-up blockers
  • Personal software firewalls (Correct)
  • Patch management software
  • Antivirus software

Answer : Personal software firewalls

Which of the following security protocols could be configured to use EAP when connecting to a wireless access point?


Options are :

  • PSec
  • WPA-personal/TK
  • RADIUS
  • WPA2-enterprise (Correct)

Answer : WPA2-enterprise

Which of the following is associated with a command and control system?


Options are :

  • Logic bomb
  • Botne (Correct)
  • Virus
  • Rootkit

Answer : Botne

Which of the following might be referenced to determine if a server is functioning abnormally?


Options are :

  • Performance baseline (Correct)
  • Chain of custody
  • Video surveillance
  • Protocol analyzer

Answer : Performance baseline

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

Which of the following authentication methods is the MOST expensive to implement?


Options are :

  • Access Control List (ACL)
  • Biometric reader (Correct)
  • Username and password
  • Group policies

Answer : Biometric reader

A SQL database MOST likely implements which of the following access security mechanisms?


Options are :

  • Mandatory access control (Correct)
  • Discretionary access control
  • Domain password policy
  • Biometrics

Answer : Mandatory access control

Which of the following allows remote access servers to authenticate to a central server?


Options are :

  • Password authentication
  • RADIUS (Correct)
  • Authentication protocols
  • WLAN properties

Answer : RADIUS

Which of the following is MOST likely the reason why a security administrator would run a Wire shark report on an important server?


Options are :

  • To enumerate and crack weak system passwords
  • To detect files that have been altered during downloads
  • To analyze packets and frames (Correct)
  • To decrypt WEP traffic and keys

Answer : To analyze packets and frames

Which of the following is consistent with the least privilege best practice?


Options are :

  • Restricting administrator permissions to the smallest amount of staff possible (Correct)
  • Enforcing physical access controls so no one can enter the data cente
  • Restricting user permissions so only one person can print
  • Deploying privileged users accounts to all department managers

Answer : Restricting administrator permissions to the smallest amount of staff possible

Which of the following does an attacker with minimal rights need to accomplish to continue attacking a compromised system?


Options are :

  • Rootkit
  • Cross-site scripting
  • Privilege escalation (Correct)
  • Logic bomb

Answer : Privilege escalation

Comptia Certification Collection

A company wants a security technician to make sure that users cannot use common words for their passwords. Which of the following can the technician implement? (Select TWO)


Options are :

  • Logical tokens
  • Single sign-on
  • Group policies (Correct)
  • Two factor authentication
  • Complex passwords (Correct)

Answer : Group policies Complex passwords

An employee in the Human Resources department transfers to the Accounting department. The employee is given access to the accounting systems but no longer has access to the Human Resources systems. This is an example of which of the following security concepts?


Options are :

  • Chain of custody
  • Least privilege (Correct)
  • Privilege escalation
  • Default accounts

Answer : Least privilege

Which of the following events are typically written to system logs?


Options are :

  • Database usag
  • DNS zone transfers
  • Service startup (Correct)
  • Web GET reques

Answer : Service startup

A security flaw in an operating system allows backdoor access into the system. The operating system vendor releases a solution quickly outside of its normal update cycle. Which of the following has the vendor released?


Options are :

  • Hotfix (Correct)
  • Cookies
  • Service pack
  • Patch

Answer : Hotfix

The network administrator has been tasked with creating a VPN connection to a vendors site. The vendor is using older equipment that does not support AES. Which of the following would be the network administrators BEST option for configuring this link?


Options are :

  • PGP
  • . 3DES (Correct)
  • One time pad
  • DES

Answer : . 3DES

Which of the following allows the administrator to verify a file is the same as the original


Options are :

  • RSA
  • AES
  • 3DES
  • MD5 (Correct)

Answer : MD5

CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 6

An administrator needs to ensure that all machines deployed to the production environment follow strict company guidelines. Which of the following are they MOST likely to use?


Options are :

  • Security templates (Correct)
  • Horizontal scans
  • Vertical scans
  • Mandatory Access Control (MAC)

Answer : Security templates

A rainbow table is used for which of the following?


Options are :

  • Protocol analysis
  • Cryptographic hashing
  • Single sign-on
  • Password cracking (Correct)

Answer : Password cracking

The IPSec authentication header provides which of the following?


Options are :

  • Integrity protection (Correct)
  • Payload encryption
  • Payload compression
  • End-point confidentiality

Answer : Integrity protection

A new application support technician is unable to install a new approved security application on a departments workstation. The security administrator needs to do which of the following?


Options are :

  • Add that user to the domain remote desktop group
  • Add that user to the domain administrators group
  • Add that user to the local power users group (Correct)
  • Add that user to the security distribution group

Answer : Add that user to the local power users group

Which of the following does file encryption protect?


Options are :

  • Availability
  • Confidentiality (Correct)
  • Authenticity
  • Identification

Answer : Confidentiality

A user from the accounting department is in the Customer Service area and tries to connect to the file server through their laptop, but is unable to access the network. The network administrator checks the network connection and verifies that there is connectivity. Which of the following is the MOST likely cause of this issue?


Options are :

  • Wrong VLAN (Correct)
  • . NAT is not properly configured
  • IPS has blocked access
  • File server is not on the DMZ

Answer : Wrong VLAN

CompTIA Security+ Cert. (SY0-501): Practice Tests 2019 Set 1

Which of the following will MOST likely block known network attacks?


Options are :

  • NIDS
  • HIDS
  • NIPS (Correct)
  • HIPS

Answer : NIPS

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions