CompTIA JK0-015 E2C Security+ Certification Practice Test Set 24

Which of the following file transfer protocols is a continuation of SSH?


Options are :

  • FTP
  • FTP
  • SFTP (Correct)
  • None
  • TFPT

Answer : SFTP

Which of the following is the most important reason related to security, why social networking sites have been blocked in a large firm?


Options are :

  • None
  • Users can inadvertently send sensitive business information. (Correct)
  • Data traffic can cause strain on the system and can overwhelm the firewall rule sets.
  • Usersâ € ™ productivity of work will be greatly reduced.
  • The proxy server must be configured for all specific social networking sites.

Answer : Users can inadvertently send sensitive business information.

The network administrator must configure the FTP server in active mode. Which of the following is the control port by default?


Options are :

  • $21 (Correct)
  • $23
  • $20
  • None
  • $22

Answer : $21

Security administrator investigates the biggest difference TACACS, and TACACS + before one installed. The administrator has found that:


Options are :

  • TACACS use IPX and TACACS + only supports IP.
  • TACACS + TACACS again uses TCP can use either TCP or UDP. (Correct)
  • None
  • TACACS can only be used on switches and routers while TACACS + supports firewalls as well.
  • TACACS authentication does not encrypt while TACACS + does.

Answer : TACACS + TACACS again uses TCP can use either TCP or UDP.

Which of the following describes why the e-mail sender can encrypt e-mail has its own key?


Options are :

  • confidence
  • transfer rate
  • traffic encryption
  • None
  • Non-repudiation (Correct)

Answer : Non-repudiation

SY0-401 CompTIA Security+ Certification Practice Exam Set 6

Online Book Review forum is designed to anonymous customers for feedback on other potential readers. The purpose of the forum is to integrate an existing online bookstore in order to increase sales. Which of the following best describes the expected confidentiality, integrity and availability of required content of the Platform, which has contributed to the users?


Options are :

  • None
  • Confidentiality of low, medium or high integrity, availability medium (Correct)
  • Low reliability, low integrity, the low availability
  • High reliability, high integrity, high availability
  • High reliability, high integrity, low availability

Answer : Confidentiality of low, medium or high integrity, availability medium

Which of the following provides integrity verification while saving data?


Options are :

  • ACL
  • None
  • hashing (Correct)
  • encryption
  • PKI

Answer : hashing

Which of the following is a method of validating a BCP?


Options are :

  • test track (Correct)
  • For Business analysis of the impact of
  • The audit logs
  • None
  • Disaster Recovery Planning

Answer : test track

What is responsible for the following checks on the safety of the unit carried out if customers have to spend at least ten upper and lower case alphanumeric characters and special characters?


Options are :

  • account of disability
  • None
  • password complexity (Correct)
  • File encryption strength
  • Username lockout

Answer : password complexity

Which of the following protocols to implement security at the lowest level of the OSI?


Options are :

  • ICMP
  • None
  • SSH
  • SSL
  • IPSec (Correct)

Answer : IPSec

A bulk update fails and write incorrect information for the entire database. Which of the following terms describes what has been compromised?


Options are :

  • Availability
  • confidence
  • integrity (Correct)
  • None
  • Authenticity

Answer : integrity

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 9

Based on the logs, file servers, remote access and IDS, malicious insider stealing data from the portable computer when connected to the VPN. Changed the company wants to get the laptop to determine loss, but Insider € ™ s lawyer requires a laptop can not be identified. Which of the following would be better used to identify a specific computer used by an insider?


Options are :

  • name of the computer
  • None
  • user Profiles
  • Mac address (Correct)
  • IP address

Answer : Mac address

The user can no longer transfer files to an FTP server. responsible for the safety of the unit has checked the ports are open on the network firewall. Which of the following would be a security administrator to check?


Options are :

  • Anti-virus software
  • NIDS
  • ACLS (Correct)
  • Anti-spam software
  • None

Answer : ACLS

Which of the following attacks occur embedded in HTML or JavaScript image object image tag email?


Options are :

  • Cross-site scripting (Correct)
  • Cross-site forgery request,
  • None
  • exception handling
  • adware

Answer : Cross-site scripting

Which of the following additional key space of the highest password?


Options are :

  • Two-factor authentication
  • 25 or more alpha-numeric characters
  • None
  • The sequential alphanumeric patterns
  • Letters, numbers and special characters (Correct)

Answer : Letters, numbers and special characters

The technician has to determine the network device allows only certain protocols, that the external servers and block requests to other internal sources. This is an example:


Options are :

  • None
  • demilitarized zone.
  • Load Balancer.
  • the layer 2 switch.
  • A stateful firewall. (Correct)

Answer : A stateful firewall.

Which of the following is the most effective way to provide security in-house application created during software development?


Options are :

  • Third-party black box testing of the completed application before it goes live
  • Third-party white-box testing of the completed application before it goes live
  • None
  • Ensures application firewall protection application
  • Inside clearly during the security gates SDLC (Correct)

Answer : Inside clearly during the security gates SDLC

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 1

During the business continuity planning, states that the critical application can not be more than one hour recovery time. Which of the following is required in order to achieve this goal?


Options are :

  • hot site (Correct)
  • None
  • warm ties
  • cold site
  • off-site storage

Answer : hot site

Which of the following locations would be a forensic analyst to look to find the hooked process?


Options are :

  • Slack space
  • BIOS
  • rootkit
  • None
  • RAM (Correct)

Answer : RAM

Which of the following best describes the attack, in which unwanted messages sent to mobile devices in the vicinity?


Options are :

  • wardriving
  • Bluesnarfing
  • None
  • Smurf attack
  • Bluejacking (Correct)

Answer : Bluejacking

Which of the following authentication methods are among the typical corporate environment to authenticate a list of the employees?


Options are :

  • None
  • LDAP (Correct)
  • twofish
  • ACLS
  • Kerberos

Answer : LDAP

Which of the following processes the collection business / unit plan requirements a main input in the development of business continuity?


Options are :

  • BIA (Correct)
  • None
  • NIST
  • SLA
  • DRP

Answer : BIA

Which of the following is the primary purpose of a digital signature? (Choose two).


Options are :

  • integrity (Correct)
  • Availability
  • Non-repudiation (Correct)
  • encryption
  • confidence

Answer : integrity Non-repudiation

JK0-802 CompTIA A+ Certification Exam Set 12

Which of the following is the most secure wireless protocol?


Options are :

  • WEP
  • TKIP
  • None
  • CCMP (Correct)
  • WPA

Answer : CCMP

Which of the following protocols for the use of the system administrator is most likely to follow the parameters of network devices?


Options are :

  • None
  • NetBIOS
  • SNMP (Correct)
  • SMTP
  • ICMP

Answer : SNMP

Which of the following should be included in fire alarm systems to help prevent the spread of fire?


Options are :

  • HVAC (Correct)
  • humidity control
  • video surveillance
  • thermostats
  • None

Answer : HVAC

Forward erroneously claims the data WebSite € ™ s form and is able to determine the type of database used by the application and the SQL used to query the database. Which of the following is responsible for the publication of these data?


Options are :

  • fuzzing
  • None
  • XSS
  • SQL injection
  • error handling (Correct)

Answer : error handling

The decision to build a redundant data center most likely came from which of the following?


Options are :

  • Application performance monitoring
  • Safety procedures Review
  • For Business analysis of the impact of (Correct)
  • None
  • Utilities cost analysis

Answer : For Business analysis of the impact of

The hostile insider receives a copy of a virtual machine containing an image server to client accounts from the house virtualization cluster. Which of the following would be the best to prevent malicious insiders from using client records?


Options are :

  • Cloud computing
  • encryption of files and folders (Correct)
  • None
  • Segregation of duties
  • Portable Media Encryption

Answer : encryption of files and folders

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

Which of the following ports should prevent the security administrator if an administrator wanted to prevent users from accessing the outside of the SMTP service?


Options are :

  • None
  • 25 (Correct)
  • 110
  • 143
  • 21

Answer : 25

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions