CompTIA JK0-015 E2C Security+ Certification Practice Test Set 22

Which of the following enables two people to communicate securely without having to know each other before the communication?


Options are :

  • HARROW
  • symmetric keys
  • PKI (Correct)
  • 3DES
  • None

Answer : PKI

The user saves the contents of the file. Which of the following allows the user to verify that the file is the original?


Options are :

  • 3DES
  • None
  • MD5 (Correct)
  • RSA
  • NTFS

Answer : MD5

The manager is the task of the system administrator to test the security of the network. The director wants to know if the things that need to be resolved, but the manager is concerned about the impact on normal operations. Which of the following should be used to test the network?


Options are :

  • Read the log files of each system on the web.
  • To launch an attack DDOD online and see what happens.
  • None
  • Use a vulnerability scanner (Correct)
  • Use the protocol analyzer

Answer : Use a vulnerability scanner

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 4

Which of the following enables security and cope with potentially malicious traffic traversing the network


Options are :

  • performance monitor
  • monitor Systems
  • None
  • protocol analyzer (Correct)
  • Task Manager

Answer : protocol analyzer

Which of the following attacks can be mitigated by shredding confidential documents?


Options are :

  • phishing
  • shoulder surfing
  • dumpster diving (Correct)
  • Hoax
  • None

Answer : dumpster diving

The network administrator has been asked to shut down access to the command line for some users. Which of the following is the best choice to complete this request?


Options are :

  • The use of patches.
  • Use service packs.
  • None
  • The use of group policy (Correct)
  • Enable the hotfix.

Answer : The use of group policy

Which of the following audit systems should be used in order to check the permissions and be able to know who is trying to use for critical systems?


Options are :

  • account expiration
  • failed login attempts (Correct)
  • password policy
  • Group policy
  • None

Answer : failed login attempts

Which of the following tools are used to inform a wide range of security and configuration problems online?


Options are :

  • Port scanner
  • None
  • protocol analyzer
  • vulnerability scanner (Correct)
  • TACACS

Answer : vulnerability scanner

In order to help maintain the security of the system, employees are given only the rights to do their current job function. Which of the following best describes this practice?


Options are :

  • Segregation of duties
  • of least privilege (Correct)
  • None
  • The implicit deny
  • Cycle

Answer : of least privilege

CompTIA Security+ SY0-501 Questions & Answers Set 3

Security Manager decide to make daily responsibility for firewall and NIDS management of the various technicians. This is an example, which of the following?


Options are :

  • None
  • Segregation of duties (Correct)
  • Cycle
  • of least privilege
  • The implicit deny

Answer : Segregation of duties

The computer is to display the MBR error when rebooting. The technician explains the user has just installed new software. Which of the following threats is the most likely cause of this error?


Options are :

  • ActiveX
  • None
  • distributed DoS
  • Trojan
  • A boot sector virus (Correct)

Answer : A boot sector virus

An administrator wants to ensure that business users to monitor the security password complexity requirements. What could be used to check passwords of the following?


Options are :

  • password cracking (Correct)
  • password listing
  • None
  • password hashing
  • password hardening

Answer : password cracking

Which of the following solutions for the desktop, the user can implement to detect and remove malicious software downloaded?


Options are :

  • antivirus (Correct)
  • party wall
  • None
  • HIPS
  • HIDs

Answer : antivirus

During the change of leadership at the meeting approved changes to the firewall. Which of the following processes should be an administrator to monitor?


Options are :

  • Save all the current entries and make the changes
  • A backup of all current entries, perform and record any changes in (Correct)
  • None
  • Put the firewall offline to perform all the changes and return it to the network.
  • A record of all changes performed.

Answer : A backup of all current entries, perform and record any changes in

Which of the following best describes the NAC?


Options are :

  • Provides access based on pre-defined properties (Correct)
  • None
  • Provides access based on ARP requests
  • Translate between the DHCP requests and IP addresses
  • To translate private addresses and public addresses

Answer : Provides access based on pre-defined properties

CompTIA JK0-022 E2C Security+ Compliance & Operational Exam Set 9

Which of the following can be implemented to ensure that the employee can use the system outside normal business hours?


Options are :

  • account expiration
  • Time limits (Correct)
  • None
  • Two-factor authentication
  • The implicit deny

Answer : Time limits

Which of the following is the best practice when creating groups of user and computer accounts in the directory service?


Options are :

  • Delegation to the introduction of administration and politics (Correct)
  • None
  • Naming conventions and technical qualifications
  • Seniority of the company and access level
  • Department and salary ranges

Answer : Delegation to the introduction of administration and politics

Which of the following appeals to the prime numbers to generate the keys?


Options are :

  • HARROW
  • None
  • IPSec
  • RSA (Correct)
  • elliptic curve

Answer : RSA

From which of the following algorithms are based on PGP?


Options are :

  • RSA (Correct)
  • WPA
  • D FLAT
  • MD5
  • None

Answer : RSA

The computer or device that is set to only monitor the network and the suspected attack techniques are known:


Options are :

  • the content filter.
  • dummy terminal.
  • honey pot. (Correct)
  • proxy.
  • None

Answer : honey pot.

Which of the following is the most important disadvantage of the implementation of the certificate revocation list?


Options are :

  • It is a single point of failure and expensive to maintain (Correct)
  • CRL database can not be duplicated.
  • Withdrawal is not instantaneous.
  • None
  • Only a certain number of certificates may be canceled

Answer : It is a single point of failure and expensive to maintain

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

The most expensive and effective alternative site that offers access to the highest level, is called:


Options are :

  • warm earth.
  • None
  • cold site.
  • The primary site.
  • hot site. (Correct)

Answer : hot site.

Which of the following BEST describes the DMZ?


Options are :

  • Reliable segment of the VPN concentrator.
  • The network, which is located between trusted and non-trusted networks. (Correct)
  • Reliable connection between the two networks.
  • Secure network, which is encrypted end-to-end.
  • None

Answer : The network, which is located between trusted and non-trusted networks.

Which of the following is the easiest to implement to protect human system?


Options are :

  • Personal firewall software (Correct)
  • Proxy server
  • None
  • Internet content filter
  • protocol analyzer

Answer : Personal firewall software

Which of the following is used to determine which are transported to the hard disk during the incident response investigation?


Options are :

  • Disclosure guidelines
  • chain of custody (Correct)
  • control damage and loss
  • forensic policy
  • None

Answer : chain of custody

Which of the following devices would be used to get a secure network without affecting network connection?


Options are :

  • party wall
  • Fiber-optic splicer
  • router
  • vampire tap (Correct)
  • None

Answer : vampire tap

The network administrator has determined that a large number of companies implementing network clients connect to an IRC server on the Internet, and these same workstations DDoS attacks on remote systems. Which of the following best describes the terms and conditions of this situation?


Options are :

  • Worm
  • None
  • botnet (Correct)
  • spam
  • rootkit

Answer : botnet

SY0-401 CompTIA Security+ Certification Practice Exam Set 1

IT department has problems with outdated due to recent vulnerabilities found in network software on new computers that are running. Which of the following would be the best way to address this issue the administrator?


Options are :

  • None
  • Make sure that all patches are installed Employees
  • To set up a configuration baselines pictures (Correct)
  • Implement Group Policies
  • To create security templates OS

Answer : To set up a configuration baselines pictures

The company's NIDS is configured to pull updates for the seller and match traffic flows in these updates. Which of the following best describes this configuration?


Options are :

  • Anomaly-based
  • oval-based
  • None
  • signature-based (Correct)
  • behavior-based

Answer : signature-based

Which of the following would be the system administrator is likely after the upgrade deployment costs Service Pack?


Options are :

  • None
  • patch
  • configuration baseline (Correct)
  • hotfix
  • Group policy

Answer : configuration baseline

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions