CompTIA JK0-015 E2C Security+ Certification Practice Test Set 18

Which of the following provides a security buffer, after passing through a firewall, by separating a network and still allowing access to that network?


Options are :

  • VLAN
  • NAT
  • NAC
  • . DMZ

Answer : . DMZ

One of the company's sales representatives had been working as the accounts payable representative while that associate was out on leave. The accounts payable representative has returned and now the sales representative is unable to access the files on the accounting server. Which of the following BEST describes the access control method used to limit access to the accounting server?


Options are :

  • Implicit deny
  • Separation of duties
  • Least privilege
  • Job rotation

Answer : Separation of duties

Which of the following technologies address key management?


Options are :

  • Diffie-Hellman
  • Blowfish
  • Advanced encryption standard
  • Digital signature algorithm

Answer : Diffie-Hellman

A user reports that they can no longer access the accounting share drive. That user was moved to the Finance department but still needs access to the accounting share drive. Which of the following actions should an administrator MOST likely do?


Options are :

  • Add the user to the correct security group
  • . Add the user to the correct distribution group
  • Give that specific user rights to the shared drive
  • Provide the user with full access rights to that shared drive

Answer : Add the user to the correct security group

Which of the following BEST describes why USB storage devices present a security risk to the confidentiality of data?


Options are :

  • High volume and transfer speeds combined with ease of concealment.
  • Slow data transfer speeds combined with ease of concealment.
  • Ability to remotely install keylogger software and bypass network routing.
  • High raw storage capacity combined with wireless transfer capability

Answer : High volume and transfer speeds combined with ease of concealment.

CompTIA IT Fundamentals (Exam FC0-U61) Practice Tests Set 2

Which of the following would be used to send an encrypted email?


Options are :

  • LT2P
  • S/MIME
  • SSH
  • PPTP

Answer : S/MIME

Modern cell phones present a security risk to corporate networks because of which of the following?


Options are :

  • Cell phones are vulnerable to logic bombs.
  • It is difficult to push security policies to cell phones.
  • Cell phones can be used to spread computer viruses.
  • Cell phone signals interfere with fiber networks.

Answer : Cell phones can be used to spread computer viruses.

An administrator wants to make sure that network machines stay up-to-date with current solutions, which of the following should be done on a regular basis to help facilitate this need?


Options are :

  • Configuration baselines
  • Patch management
  • Driver updates
  • Group policy updates

Answer : Patch management

Which of the following is a component of a disaster recovery plan for a company that expects a site to be rendered non-usable during a disaster and needs a nearly transparent transfer of operations?


Options are :

  • Warm site
  • Hot site
  • Cold site
  • Alternate site

Answer : Hot site

A network administrator was recently promoted from their former position as a server administrator and now can no longer log on to servers they previously supported. This is an example of:


Options are :

  • separation of duties
  • implicit deny.
  • job rotation.
  • single sign on.

Answer : separation of duties

A security administrator reassembles the output of a captured TCP stream to diagnose problems with a web server. Which of the following is the administrator MOST likely using?


Options are :

  • Port scanner
  • Protocol analyzer
  • Session hijacking
  • Replay attack

Answer : Protocol analyzer

FC0-TS1 CompTIA Strata IT for Sales Practice Exam Set 3

In evaluating risk assessments, senior level managers would MOST likely accept a risk based on which of the following reasons?


Options are :

  • Physical security measures will take weeks to install
  • Cost of mitigation outweighs the risk
  • Complexity of fixing the vulnerability
  • The potential impact of the risk is easily mitigated

Answer : Cost of mitigation outweighs the risk

An attacker uses an account that allows read-only access to the firewall for checking logs and configuration files to gain access to an account that gives full control over firewall configuration. This type of attack is BEST known as:


Options are :

  • a man-in-the-middle attack.
  • exploiting a weak password
  • privilege escalation.
  • exploiting a back door

Answer : privilege escalation.

Which of the following authentication models often requires different systems to function together and is complicated to implement in non-homogeneous environments?


Options are :

  • One factor authentication
  • Three factor authentication
  • Single sign-on
  • Two factor authentication

Answer : Single sign-on

Which of the following is the main disadvantage of implementing a certificate revocation list?


Options are :

  • It is a single point of failure and expensive to maintain
  • Only a certain number of certificates can be revoked
  • Revocation is not instantaneous.
  • The CRL database cannot be duplicated.

Answer : It is a single point of failure and expensive to maintain

A security administrator is worried about attackers accessing a specific server within the company's network. Which of the following would allow the security staff to identify unauthorized access to the server?


Options are :

  • Antivirus
  • Honeypot
  • Anti-spyware
  • HIDS

Answer : HIDS

Command-and-Control is a key element of a:


Options are :

  • trojan.
  • botnet.
  • logic bomb.
  • rootkit

Answer : botnet.

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 2

Which of the following tools is used to report a wide range of security and configuration problems on a network?


Options are :

  • Protocol analyzer
  • Vulnerability scanner
  • TACACS
  • Port scanner

Answer : Vulnerability scanner

A security administrator has detected that the company websites source code contains suspicious numbers of white spaces and non-printable characters at the end of each line of code. Which of the following is being used in order to leak sensitive information to the competition?


Options are :

  • Code fuzzing
  • Obfuscation
  • Steganography
  • Encryption

Answer : Steganography

Which of the following would an administrator MOST likely update after deploying a service pack?


Options are :

  • Configuration baseline
  • Hotfix
  • Patch
  • Group policy

Answer : Configuration baseline

Which of the following is an example of a single sign-on?


Options are :

  • The use of three factor authentication on single systems.
  • Access to multiple systems with a single authentication method
  • Authentication to individual systems with a single authentication factor.
  • Access to individual systems with a single password.

Answer : Access to multiple systems with a single authentication method

A security manager decides to assign the daily responsibility of firewall and NIDS administration to different technicians. This is an example of which of the following?


Options are :

  • Separation of duties
  • Least privilege
  • Job rotation
  • Implicit deny

Answer : Separation of duties

Which of the following is a best practice when creating groups of user and computer accounts in a directory service?


Options are :

  • Naming conventions and technical aptitude
  • Department and salary divisions
  • Seniority at the company and access level
  • Delegation of administration and policy deployment

Answer : Delegation of administration and policy deployment

CompTIA IT Fundamentals (Exam FC0-U61) Practice Tests Set 2

An employee with a regular user account has downloaded a software program which allowed the user to join the administrator group. Which of the following is occurring?


Options are :

  • Trojan
  • Privilege escalation
  • Buffer overflow
  • Virus

Answer : Privilege escalation

Which operating system hardening procedure can be implemented to ensure all systems have the most up-todate version available?


Options are :

  • Group policies
  • Security templates
  • Patch management
  • Configuration baselines

Answer : Patch management

Which of the following ports is susceptible to DNS poisoning?


Options are :

  • 53
  • 8080
  • 23
  • 80

Answer : 53

During a change management meeting, changes within the firewall were approved. Which of the following processes should an administrator follow?


Options are :

  • Log all changes being performed.
  • Put firewall offline to perform all changes and return it online.
  • Backup all current entries, perform and log all changes
  • Save all current entries and perform changes

Answer : Backup all current entries, perform and log all changes

The company's NIDS system is configured to pull updates from the vendor and match traffic patterns based on these updates. Which of the following BEST describes this configuration?


Options are :

  • Anomaly-based
  • OVAL-based
  • Signature-based
  • Behavior-based

Answer : Signature-based

The MOST expensive and effective alternate site that provides the HIGHEST level of availability, is called a:


Options are :

  • cold site.
  • primary site.
  • hot site.
  • warm site.

Answer : hot site.

220-802 CompTIA A+ Certification Practice Exam Set 1

A computer is displaying an MBR error upon restart. The technician is told the user has just installed new software. Which of the following threats is the MOST likely cause of this error?


Options are :

  • Trojan
  • Distributed DoS
  • Boot sector virus
  • ActiveX

Answer : Boot sector virus

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions