CompTIA JK0-015 E2C Security+ Certification Practice Test Set 2

Which of the following would a security administrator MOST likely look for during a vulnerability assessment?


Options are :

  • Actively test security controls
  • Ability to gain administrative access to various systems
  • Identify lack of security controls (Correct)
  • Exploit vulnerabilities

Answer : Identify lack of security controls

Which of the following concepts ensures that the data does not change in route to its final destination?


Options are :

  • Availability
  • Confidentiality
  • Redundancy
  • Integrity (Correct)

Answer : Integrity

Which of the following port numbers is used for SCP, by default?


Options are :

  • 80
  • 22 (Correct)
  • 69
  • 443

Answer : 22

Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?


Options are :

  • SNMP
  • SCP
  • SFTP
  • SSH (Correct)

Answer : SSH

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Which of the following requires special handling and explicit policies for data retention and data distribution?


Options are :

  • Personal electronic devices
  • Phishing attacks
  • Zero day exploits
  • Personally identifiable information (Correct)

Answer : Personally identifiable information

Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?


Options are :

  • Fire suppression
  • Video monitoring
  • EMI shielding
  • Hot and cold aisles (Correct)

Answer : Hot and cold aisles

Applying detailed instructions to manage the flow of network traffic at the edge of the network, including allowing or denying traffic based on port, protocol, address, or direction is an implementation of which of the following?


Options are :

  • Virtualization
  • IPSec
  • Firewall rules (Correct)
  • Port security

Answer : Firewall rules

Which of the following should be performed before a hard drive is analyzed with forensics tools?


Options are :

  • Disconnect system from network
  • Capture system image (Correct)
  • Identify user habits
  • Interview witnesses

Answer : Capture system image

In an 802.11n network, which of the following provides the MOST secure method of both encryption and authorization?


Options are :

  • WPA2-PSK
  • WEP with 802.1x
  • WPA Enterprise (Correct)
  • WPA with TKIP

Answer : WPA Enterprise

Performing routine security audits is a form of which of the following controls?


Options are :

  • Preventive
  • Proactive
  • Protective
  • Detective (Correct)

Answer : Detective

CompTIA Project+ (PK0-004) 5 Practice Test 2019 Set 4

Which of the following would be used to notify users of proper system usage?


Options are :

  • Separation of Duties
  • Audit Logs
  • Job Description
  • Acceptable Use Policy (Correct)

Answer : Acceptable Use Policy

Which of the following BEST describes the process of key escrow?


Options are :

  • Maintains a secured copy of a userís public key in order to improve network performance
  • Maintains a secured copy of a userís private key for the sole purpose of recovering the key if it is lost (Correct)
  • Maintains a secured copy of a userís private key to recover the certificate revocation list
  • Maintains a copy of a userís public key for the sole purpose of recovering messages if it is lost

Answer : Maintains a secured copy of a userís private key for the sole purpose of recovering the key if it is lost

Which of the following BEST describes the proper method and reason to implement port security?


Options are :

  • Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network. (Correct)
  • Apply a security control which ties specific ports to end-device IP addresses and prevents mobile devices from being connected to the network.
  • Apply a security control which ties specific ports to end-device MAC addresses and prevents all devices from being connected to the network.
  • Apply a security control which ties specific networks to end-device IP addresses and prevents new devices from being connected to the network.

Answer : Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.

Which of the following devices should be used to allow secure remote network access for mobile users?


Options are :

  • VPN concentrator (Correct)
  • Protocol analyzer
  • SFTP
  • NIDS

Answer : VPN concentrator

Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?


Options are :

  • IPv4
  • HTTPS
  • ICMP (Correct)
  • SSH

Answer : ICMP

Which of the following methods of access, authentication, and authorization is the MOST secure by default?


Options are :

  • LDAP
  • RADIUS
  • TACACS
  • Kerberos (Correct)

Answer : Kerberos

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 13

Which of the following software types BEST dissects IP frames for inspection or review by a security administrator?


Options are :

  • Gateway
  • Protocol analyzer (Correct)
  • Software firewall
  • Load balancer

Answer : Protocol analyzer

Which of the following would be implemented to allow access to services while segmenting access to the internal network?


Options are :

  • DMZ (Correct)
  • NAT
  • IPSec
  • VPN

Answer : DMZ

Upon investigation, an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?


Options are :

  • Rootkit (Correct)
  • Virus
  • Trojan
  • Logic bomb

Answer : Rootkit

Which of the following cloud computing concepts is BEST described as providing an easy-to-configure OS and on-demand computing for customers?


Options are :

  • Infrastructure as a Service
  • Software as a Service
  • Platform as a Service (Correct)
  • Trusted OS as a Service

Answer : Platform as a Service

Which access control system allows the system administrator to establish access permissions to network resources?


Options are :

  • RBAC
  • DAC
  • None of the above.
  • MAC (Correct)

Answer : MAC

Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended persons?


Options are :

  • Non-repudiation
  • Integrity
  • Confidentiality (Correct)
  • Authentication

Answer : Confidentiality

What is the objective of using a password cracker?


Options are :

  • To look for weak passwords on the network (Correct)
  • To enforce password complexity requirements
  • To change a users passwords when they leave the company
  • To change users passwords if they have forgotten them

Answer : To look for weak passwords on the network

An important component of a good data retention policy is:


Options are :

  • magnetic media sorting
  • backup software licensing
  • server drive redundancy
  • offsite storage (Correct)

Answer : offsite storage

SK0-004 CompTIA Server+ Certification Practice Exam Set 6

After installing new software on a machine, what needs to be updated to the baseline?


Options are :

  • Signature-based NIPS
  • Signature-based NIDS
  • Behavior-based HIDS (Correct)
  • Honeypot

Answer : Behavior-based HIDS

Which access control system allows the owner of a resource to establish access permissions to that resource?


Options are :

  • DAC (Correct)
  • MAC
  • RBAC
  • None of the above.

Answer : DAC

Which of the following is not an organizational policy that reduces the impact of fraud?


Options are :

  • separation of duties.
  • escorting procedures.
  • password complexity rules. (Correct)
  • job rotation.

Answer : password complexity rules.

Which security policy will be most likely used while attempting to mitigate the risks involved with allowing a user to access company email via their cell phone?


Options are :

  • The cell phone should require a password after a set period of inactivity (Correct)
  • . The cell phone data should be encrypted according to NIST standards
  • The cell phone should have data connection abilities disabled.
  • he cell phone should only be used for company related emails

Answer : The cell phone should require a password after a set period of inactivity

Network traffic is data in a network. Which tool can be used to review network traffic for clear text passwords?


Options are :

  • Password cracker
  • Firewal
  • Protocol analyzer (Correct)
  • Port scanner

Answer : Protocol analyzer

Look at the following scenarios, which one would a penetration test BEST be used for?


Options are :

  • When conducting performance monitoring
  • While in the reconnaissance phase
  • When performing network mapping
  • . When providing a proof of concept demonstration for a vulnerability (Correct)

Answer : . When providing a proof of concept demonstration for a vulnerability

Comptia Linux+ LX0-103 Certification Exam Practice Test Set 1

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions