CompTIA JK0-015 E2C Security+ Certification Practice Test Set 21

Which of the following is the most appropriate risk management strategy to use in order to identify unauthorized administrative account?


Options are :

  • Managing change
  • None
  • Userâ € ™ s rights and permissions review
  • incident management
  • Routine checks system logs

Answer : Userâ € ™ s rights and permissions review

CT0-101 Convergence+ Certification Practice Exam Set 9

The entry is used to protect which of the following?


Options are :

  • best practices
  • None
  • Phishing attacks
  • clusters
  • sensitive information

Answer : sensitive information

Which of the following is used for performing quantitative risk analysis?


Options are :

  • The best exercise
  • substance
  • Target groups
  • investigations
  • None

Answer : substance

Which of the following is an example of unauthorized information to a casual observation?


Options are :

  • Whaling
  • None
  • wardriving
  • dumpster diving
  • shoulder surfing

Answer : shoulder surfing

Which of the following must be carried out before the hard drive forensics analyzes the tools?


Options are :

  • Identify the user's habits
  • Turn off the system to the network
  • interview witnesses
  • The system recovery image
  • None

Answer : The system recovery image

By applying the detailed instructions to control the flow of network traffic at the network edge, such as allow or deny traffic based on port, protocol, address, or the direction is the implementation which of the following?


Options are :

  • None
  • firewall rules
  • IPSec
  • virtualization
  • port security

Answer : firewall rules

Which of the following are used together to provide mutual authentication PEAP peers?


Options are :

  • PPP
  • MSCHAPv2
  • MSCHAPv1
  • LEAP
  • None

Answer : MSCHAPv2

CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 8

Which of the following would be used to inform users of the correct use of the system?


Options are :

  • separation of Duties
  • audit logs
  • job Description
  • None
  • Use Practices

Answer : Use Practices

Which of the following best describes the proper way and should be implemented for port security?


Options are :

  • Apply the safety controller, which is bound by certain ports to end-device MAC addresses and block all equipment is connected to the network.
  • None
  • Apply the safety controller, which is bound by certain ports to end-device MAC addresses and prevents additional devices are connected to the network.
  • Apply the security controller, which is bound by certain ports stop device IP addresses, and prevents the mobile equipment is connected to the network.
  • Apply the safety controller, which binds networks, end-device IP address and prevent new devices are connected to the network.

Answer : Apply the safety controller, which is bound by certain ports to end-device MAC addresses and prevents additional devices are connected to the network.

Which of the following operating business continuity should be implemented in order to restore the company after a critical system disruption or failure?


Options are :

  • testing of business continuity
  • None
  • Continuity day to day operations
  • disaster recovery
  • succession planning

Answer : disaster recovery

Which of the following types of software BEST dissects IP frames for inspection or review by a security administrator?


Options are :

  • firewall software
  • Load Balancer
  • port
  • protocol analyzer
  • None

Answer : protocol analyzer

Which of the following devices are used to optimize and share information with the workload across multiple computers or networks?


Options are :

  • URL filter
  • Load Balancer
  • protocol analyzer
  • None
  • VPN concentrator

Answer : Load Balancer

Routine security checks as a form of control which of the following?


Options are :

  • Anticipatory
  • None
  • detective
  • protective
  • prohibitive

Answer : detective

CompTIA Security+ (SY0-501) Complete Course & Practice Exam Set 2

User education, appropriate disclosure of information, business data processing, and security is important, because of the popularity which of the following?


Options are :

  • VPNs
  • None
  • Zero day exploit
  • Wireless Internet connections
  • Social Media Sites

Answer : Social Media Sites

Which of the following is the technical implementation of the security policy?


Options are :

  • firewall rules
  • Cloud computing
  • Flood guards
  • None
  • VLAN

Answer : firewall rules

Actively monitors data flows in search of malware or behavior is an example of


Options are :

  • content inspection.
  • load tasapainoittaminen
  • URL filtering.
  • None
  • Internet proxy.

Answer : content inspection.

Which of the following protocols is blocked from the network perimeter to prevent the host's calculation of the scanning equipment?


Options are :

  • HTTPS
  • SSH
  • IPv4
  • ICMP
  • None

Answer : ICMP

Which of the following systems to implement secure key distribution system based on individual sessions within the meaning of the keys to the paper version?


Options are :

  • PKI
  • None
  • blowfish
  • One-time pads
  • PGP / GPG

Answer : One-time pads

Which of the following will teach employees about the malicious attacker's attempt to obtain bank account information?


Options are :

  • tailgating techniques
  • handling PII
  • Password complexity requirements
  • None
  • phishing techniques

Answer : phishing techniques

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 1

Which of the following is checked using the techniques that the file has not changed?


Options are :

  • None
  • D FLAT
  • MD5
  • RC5
  • AE5

Answer : MD5

Which of the following port numbers used for the SCP, the default?


Options are :

  • None
  • $69.00
  • $80
  • $443
  • $22

Answer : $22

The main difference between qualitative and quantitative risk assessment is:


Options are :

  • Quantitative based on hard numbers again based on subjective qualitative ranking.
  • None
  • qualitative used in small companies of 100 employees or less, when used in large quantity in companies of 100 employees or more.
  • Quantitative based on the amount of resources, while the qualitative is based on the type of asset.
  • quantitative must be approved by the management while the qualitative is used within departments without permission.

Answer : Quantitative based on hard numbers again based on subjective qualitative ranking.

Which of the following safe protocols are most commonly used for remote administration of Unix / Linux systems?


Options are :

  • SCP
  • SNMP
  • SFTP
  • SSH
  • None

Answer : SSH

Rule-based access control is almost uniform, which of the following?


Options are :

  • Access Control List
  • None
  • Mandatory access control
  • Role-based access control
  • The implicit deny

Answer : Mandatory access control

Which of the following most closely associated with e-mail?


Options are :

  • SSH
  • None
  • S / MIME
  • TLS
  • IPSec

Answer : S / MIME

The command-and-control is a central part which:


Options are :

  • Trojan.
  • logic bomb.
  • rootkit
  • None
  • botnet.

Answer : botnet.

Which of the following would be used to get to the data center where the administrator should use multiple authentication factors?


Options are :

  • Fingerprint and password
  • The fingerprint and retinal scan
  • ID badge and a smart card
  • Enter two different passwords
  • None

Answer : Fingerprint and password

CAS-003 CompTIA Advanced Security Practitioner (CASP+) Exam Set 6

Which of the following authentication models often requires the operation of different systems together and is complex to implement heterogeneous environments?


Options are :

  • One-factor authentication
  • Single sign-on
  • three authentication
  • Two-factor authentication
  • None

Answer : Single sign-on

WPA2-Enterprise to use which of the following user certification?


Options are :

  • TKIP
  • RSA
  • RRAS
  • RAIN
  • None

Answer : RAIN

During the penetration test data exfiltration, which of the following is the next step to access the system?


Options are :

  • Attack weak passwords
  • DoS
  • Use the default accounts
  • privilege escalation
  • None

Answer : privilege escalation

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions