CompTIA JK0-015 E2C Security+ Certification Practice Test Set 20

Which of the following devices would be used to gain access to a secure network without affecting network connectivity?

Options are :

  • Firewall
  • Router
  • Vampire tap
  • Fiber-optic splicer

Answer : Vampire tap

A system administrator wants to verify that the corporate users are following the security policy on password complexity requirements. Which of the following could be used to verify the passwords?

Options are :

  • Password enumeration
  • Password hardening
  • Password hashing
  • Password cracking

Answer : Password cracking

Rule-based access control is closely aligned with which of the following?

Options are :

  • Access control lists
  • Implicit deny
  • Mandatory access control
  • Role-based access control

Answer : Mandatory access control

Which of the following requires special handling and clear policy on the retention of data and information sharing?

Options are :

  • None
  • personal Information
  • Personal electronic devices
  • Phishing attacks
  • Zero day exploit

Answer : personal Information

Webmail is classified as which of the following cloud-based technologies?

Options are :

  • demand Computing
  • Infrastructure as a Service (IaaS)
  • None
  • Software as a Service (SaaS)
  • Platform as a Service (PaaS)

Answer : Software as a Service (SaaS)

A technician is to allow seven to certain users with a connection to a new base station. Which of the following should be carried out to achieve this function?

Options are :

  • None
  • Disable SSID broadcast
  • Allows the MAC filter
  • To adjust the positioning of the antenna
  • Reduce the WAP power levels

Answer : Allows the MAC filter

Which of the following ports are used for NetBIOS by default? (Choose two).

Options are :

  • 443
  • 445
  • $139
  • $135
  • 143

Answer : 445 $139

CompTIA JK0-801 A Laptop Printer and Operating certify Exam Set 1

Which of the following concepts ensures that the data will not change path to your destination?

Options are :

  • None
  • Availability
  • integrity
  • termination
  • confidence

Answer : integrity

Which of the following cloud computing concepts is best described as offering easily configure the operating system and on-demand computing customers?

Options are :

  • Trusted OS as a service
  • infrastructure as a service
  • None
  • Platform as a Service
  • Software as a Service

Answer : Platform as a Service

The security administrator is responsible for the data center, a hot site and cold site. The recent disaster, the administrator must ensure that their cold site is ready to go if a disaster. Which of the following is not an administrator need to make sure is cold use the site?

Options are :

  • Location has all the necessary equipment loaded with all current patches and updates
  • Location overlapping systems can be found in the data center
  • The location close to the data center that meets the power requirements
  • In a place that meets the power and connectivity requirements
  • None

Answer : In a place that meets the power and connectivity requirements

The fundamental difference between symmetric and asymmetric key encryption systems is that the symmetric key encryption to use:

Options are :

  • Several other keys are non-repudiation of data.
  • different keys at both ends of the transport medium.
  • None
  • bulk encryption for data transmission fiber.
  • the same key on both ends of the transmission media.

Answer : the same key on both ends of the transmission media.

Which of the following be implemented to allow access to the same services segment access to the internal network?

Options are :

  • NAT
  • DMZ
  • None
  • IPSec
  • VPN

Answer : DMZ

Which of the following concepts ensures that the data is viewable only by authorized users?

Options are :

  • Availability
  • confidence
  • None
  • Biometrics
  • integrity

Answer : confidence

220-701 A+ Essentials Certification Practice Exam Set 5

Which of the following is an example wherein the second user physical access to the secure area without confirmation of their credentials?

Options are :

  • tailgating
  • None
  • Evil twin
  • shoulder surfing
  • takeoff

Answer : tailgating

What is typically used to inspect the border enclave of the following devices, block, and re-route network traffic for security reasons?

Options are :

  • None
  • firewalls
  • spam filter
  • protocol analyzers
  • load balancing

Answer : firewalls

Which of the following best describes the process of key escrow?

Options are :

  • Maintain a secure copy of userâ € ™ s private key, whose sole purpose is to collect the key if you lose it
  • To maintain a copy of userâ € ™ s public key, whose sole purpose is to back the messages, if it is lost
  • Maintain a secure copy of userâ € ™ s public key in order to improve network performance
  • Maintain a secure copy of userâ € ™ s private key to recover from the Certificate Revocation List
  • None

Answer : Maintain a secure copy of userâ € ™ s private key, whose sole purpose is to collect the key if you lose it

Which of the following stop malicious traffic from affecting the servers?

Options are :

  • None
  • NIPS
  • protocol analyzers
  • NIDS
  • sniffers

Answer : NIPS

Which of the following devices should be used to allow secure remote access to the network for mobile users?

Options are :

  • protocol analyzer
  • VPN concentrator
  • None
  • NIDS
  • SFTP

Answer : VPN concentrator

IPSec is selected from the remote access VPN connections for mobile users. What is best to protect the access of the following combinations?

Options are :

  • None
  • Of transport mode, AH
  • With tunnel mode, ESP
  • The tunnel mode, AH
  • Of transport mode, ESP

Answer : With tunnel mode, ESP

BR0-003 CompTIA A+ 2009 Edition Bridge Practice Exam Set 5

After researching the administrator finds a suspicious system-level kernel module that changes the file system. This is an example, which of the following?

Options are :

  • rootkit
  • Virus
  • Trojan
  • logic bomb
  • None

Answer : rootkit

In an 802.11n network, which of the following provides the most secure way for both encryption and authorization?

Options are :

  • WPA Enterprise
  • None
  • WPA2-PSK
  • WEP 802.1x

Answer : WPA Enterprise

Elsewhere with the necessary equipment without any effort on your part would be an example of which of the following offsite contingency plans?

Options are :

  • hot site
  • warm ties
  • None
  • cluster
  • cold site

Answer : warm ties

Which of the following prevents numerous SYN packets to be admitted to this unit?

Options are :

  • Flood guards
  • traffic encryption
  • VLAN management
  • The implicit deny
  • None

Answer : Flood guards

Which of the following methods to access, authentication, and authorization is the surest default?

Options are :

  • RAIN
  • Kerberos
  • LDAP
  • None

Answer : Kerberos

Which of the following best environmental control can be used to control the cooling of the data center?

Options are :

  • Hot and cold aisles
  • EMI shielding
  • video surveillance
  • fire-extinguishing systems
  • None

Answer : Hot and cold aisles

CompTIA CySA+ Set 1

Which of the following BEST devices using the security administrator to identify malicious activity, when it has occurred?

Options are :

  • malware inspection
  • IDS
  • party wall
  • None
  • spam filter

Answer : IDS

Which of the following is the safest way to use FTP?

Options are :

  • FTP
  • FTP active
  • passive FTP
  • None
  • SCP

Answer : FTP

Which of the following will help you identify if the system is properly handled during transport?

Options are :

  • Track the man hours and costs of the event
  • Review of network traffic and logs
  • None
  • chain of custody
  • Enable device system image

Answer : chain of custody

Security administrator shall take all AES under the companyâ € ™ s wireless network. Which of the following must be determined?

Options are :

  • None
  • CCMP
  • 802.11n
  • TKIP
  • WPA

Answer : CCMP

Which of the following would be a security administrator is likely to look for during the evaluation of the vulnerability?

Options are :

  • None
  • Recognize the lack of safety inspections
  • Actively test the security checks
  • Exploit vulnerabilities
  • The ability to obtain administrative access to various systems

Answer : Recognize the lack of safety inspections

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions