CompTIA JK0-015 E2C Security+ Certification Practice Test Set 19

The administrator needs to set permissions for the new print server for a company comprised of 320 people in 18 departments. Each department has its own set of printers. Which of the following options is the BEST way to do this?


Options are :

  • Place all the people into departmental groups. Assign printer access by matching group to department.
  • Place all the people into departmental groups. Assign access to all printers for each group.
  • Place all the people into distribution groups. Assign printer access by access group.
  • Place all the people into departmental groups. Assign printer access by matching individuals to printer groups.

Answer : Place all the people into departmental groups. Assign printer access by matching group to department.

On which of the following algorithms is PGP based?


Options are :

  • DES
  • WPA
  • RSA
  • MD5

Answer : RSA

Which of the following allows two people to communicate securely without having to know each other prior to communicating?


Options are :

  • 3DES
  • AES
  • PKI
  • Symmetric keys

Answer : PKI

Which of the following relies on prime numbers to generate keys?


Options are :

  • Elliptic curve
  • RSA
  • IPSec
  • AES

Answer : RSA

A computer or device that is setup on the network merely to monitor the habits and techniques of a suspected attack is known as a:


Options are :

  • content filter.
  • proxy.
  • honeypot.
  • dummy terminal.

Answer : honeypot.

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 9

The network administrator has determined that a large number of corporate workstations on the network are connecting to an IRC server on the Internet, and these same workstations are executing DDOS attacks on remote systems. Which of the following terms BEST describes this situation?


Options are :

  • Botnet
  • Rootkit
  • Worm
  • Spam

Answer : Botnet

Which of the following should be protected from disclosure?


Options are :

  • User's public key
  • Public key infrastructure
  • Certificate revocation list
  • User's private key passphrase

Answer : User's private key passphrase

Which of the following BEST describes NAC?


Options are :

  • Provides access based on predetermined characteristics
  • Provides access based on ARP requests
  • Translates between private addresses and public addresses
  • Translates between DHCP requests and IP addresses

Answer : Provides access based on predetermined characteristics

Which of the following is used to determine who transported a hard drive during an incident response investigation?


Options are :

  • Damage and loss control
  • Disclosure guidelines
  • Chain of custody
  • Forensic policy

Answer : Chain of custody

Which of the following is MOST closely associated with email?


Options are :

  • IPSec
  • SSH
  • S/MIME
  • TLS

Answer : S/MIME

Which of the following can be implemented to ensure an employee cannot use the system outside of normal business hours?


Options are :

  • Time of day restrictions
  • Two factor authentication
  • Implicit deny
  • Account expiration

Answer : Time of day restrictions

SY0-401 CompTIA Security+ Certification Practice Exam Set 8

Which of the following attacks can be mitigated by shredding confidential documents?


Options are :

  • Phishing
  • Shoulder surfing
  • Hoax
  • Dumpster diving

Answer : Dumpster diving

The manager has tasked an administrator to test the security of the network. The manager wants to know if there are any issues that need to be addressed, but the manager is concerned about affecting normal operations. Which of the following should be used to test the network?


Options are :

  • Use a vulnerability scanner
  • Read the log files on each system on the network.
  • Use a protocol analyzer
  • Launch a DDoD attack in the network and see what occurs.

Answer : Use a vulnerability scanner

Which of the following will allow a security administrator to determine potentially malicious traffic traversing the network


Options are :

  • Systems monitor
  • Protocol analyzer
  • Performance monitor
  • Task manager

Answer : Protocol analyzer

The network administrator has been asked to turn off access to the command prompt for some users. Which of the following is the BEST choice to complete this request?


Options are :

  • Deploy a group policy
  • Deploy a hotfix.
  • Deploy service packs.
  • Deploy patches.

Answer : Deploy a group policy

Which of the following desktop solutions can a user implement to detect and delete downloaded malware?


Options are :

  • HIDS
  • Desktop firewall
  • Antivirus
  • HIPS

Answer : Antivirus

WPA2-Enterprise can use which of the following to authenticate a user?


Options are :

  • RADIUS
  • RSA
  • RRAS
  • TKIP

Answer : RADIUS

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 3

A user is recording a file on disk. Which of the following will allow a user to verify that the file is the original?


Options are :

  • MD5
  • 3DES
  • RSA
  • NTFS

Answer : MD5

Which of the following BEST characterizes a DMZ?


Options are :

  • A network that resides between trusted and non-trusted networks.
  • A trusted network that is encrypted end-to-end.
  • A trusted segment to a VPN concentrator.
  • A connection between two trusted networks.

Answer : A network that resides between trusted and non-trusted networks.

Which of the following is the primary difference between role-based access control and rule-based access control?


Options are :

  • Both are based on job title but rule based provides greater user flexibility.
  • One is based on job function and the other on a set of approved instructions.
  • One is based on identity and the other on authentication.
  • Both are based on local legal regulations but role based provides greater security.

Answer : One is based on job function and the other on a set of approved instructions.

Which of the following BEST describes the function of a NIDS?


Options are :

  • Diverting suspicious traffic in real-time
  • Analyzing network traffic for suspicious traffic
  • DIverting spyware traffic to the DMZ
  • Analyzing LAN traffic for file sharing software

Answer : Analyzing network traffic for suspicious traffic

A user reports a problem with resetting a password on the company website. The help desk determined the user was redirected to a fraudulent website. Which of the following BEST describes attack type?


Options are :

  • Spyware
  • XSS
  • Logic bomb
  • Worm

Answer : XSS

During a data exfiltration penetration test, which of the following is the NEXT step after gaining access to a system?


Options are :

  • DoS
  • Attack weak passwords
  • Privilege escalation
  • Use default accounts

Answer : Privilege escalation

CompTIA JK0-018 Security+ E2C Certification Practice Exam Set 1

Which of the following would be used to gain access to a data center where the administrator would have to use multiple authentication factors?


Options are :

  • Fingerprint scan and password
  • ID badge and smartcard
  • Fingerprint and retina scan
  • Enter two different passwords

Answer : Fingerprint scan and password

Which of the following is the EASIEST to implement for protecting an individual system?


Options are :

  • Proxy server
  • Personal software firewall
  • Protocol analyzer
  • Internet content filter

Answer : Personal software firewall

Which of the following is performed when conducting a penetration test?


Options are :

  • Documentation of network security settings, policy gaps and user errors.
  • Demonstrations of network capabilities and resiliency.
  • Demonstrations of security vulnerabilities and flaws in policy implementation.
  • Documentation of security vulnerabilities and policy gaps.

Answer : Demonstrations of security vulnerabilities and flaws in policy implementation.

Which of the following audit systems should be enabled in order to audit user access and be able to know who is trying to access critical systems?


Options are :

  • Failed logon attempts
  • Account expiration
  • Group policy
  • Password policy

Answer : Failed logon attempts

The IT department has been having issues lately with vulnerabilities occurring on the network due to outdated software on new computers that are deployed. Which of the following would be the BEST way for the administrator to address this issue?


Options are :

  • Implement group policies
  • Build security templates for the OS
  • Establish configuration baselines for the images
  • Ensure that all patches are installed by employees

Answer : Establish configuration baselines for the images

After deploying a new IDS, an administrator notices a large amount of notifications coming from a filter inspecting port 445. Which of the following can BEST help the administrator in determining if the notifications are false positives?


Options are :

  • Firewall log
  • Protocol analyzer
  • The router tables
  • IDS performance monitor

Answer : Protocol analyzer

CompTIA A+ 220 901

In order to help maintain system security, employees are only given rights to perform their current job function. Which of the following BEST describes this practice?


Options are :

  • Implicit deny
  • Least privilege
  • Job rotation
  • Separation of duties

Answer : Least privilege

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions