CompTIA JK0-015 E2C Security+ Certification Practice Test Set 26

Which of the following security controls should be implemented to prevent the server administrators from accessing information stored in the application server?


Options are :

  • Full disk encryption
  • The implicit deny
  • Managing change
  • None
  • file encryption (Correct)

Answer : file encryption

Practice : CompTIA Network+ (N10-007)

The user will tell you that there have been a number of incorrect charges on their company credit card. The user said these charges after a recent call from the bank, because of the unusual e-mail user received. When examining email, by the Security detects that the phone number, e-mail is not responsible for the telephone number listed on Banka € ™ s website. When you call that number, the technician did not get exactly the respondents as the bank and finally the actual bank. This is an example, which of the following?


Options are :

  • vishing (Correct)
  • None
  • SPIM
  • phishing
  • Spear Phishing

Answer : vishing

Safety engineer duration of the war, the new CA. Which of the following is the best strategy after the introduction of intermediate root CA a trusted CA?


Options are :

  • It should be placed in the DMZ.
  • It is placed outside the firewall.
  • None
  • It should be placed in the internal network.
  • It should be sealed and kept in a safe place. (Correct)

Answer : It should be sealed and kept in a safe place.

Which of the following should monitor the mobile devices to prevent data loss from stolen devices?


Options are :

  • Host Firewall
  • HIDs
  • device encryption (Correct)
  • None
  • USB encryption

Answer : device encryption

Which of the following is an example when the user has a password of 16 characters or more?


Options are :

  • Password complexity requirements
  • Password length requirements (Correct)
  • Password recovery requirements
  • None
  • Password Expiration requirements

Answer : Password length requirements

Which of the following is specific to the header manipulation?


Options are :

  • None
  • overlap
  • java instructions
  • the payload section
  • Bunting (Correct)

Answer : Bunting

Which of the following is a security best practice, when an employee leaves the company?


Options are :

  • account reissue
  • Account password complexity
  • account of disability (Correct)
  • Account password recovery
  • None

Answer : account of disability

Mock Test : CompTIA CySA+ (CS0-001)

Which of the following web application security weaknesses can be mitigated to prevent the use of HTML tags?


Options are :

  • SQL injection
  • LDAP injection
  • Cross-site scripting (Correct)
  • Handling errors and exceptions
  • None

Answer : Cross-site scripting

Which of the following is an example of forcing users to change their passwords every 90 days?


Options are :

  • Password length requirements
  • Password Expiration requirements (Correct)
  • Password complexity requirements
  • None
  • Password recovery requirements

Answer : Password Expiration requirements

Which of the following technologies are often used for attackers to hide the origin of the attack?


Options are :

  • Flood guard
  • Load Balancer
  • URL filtering
  • None
  • transparent proxy (Correct)

Answer : transparent proxy

The black boxes on the evaluation of the application is one where the safety assessor is:


Options are :

  • access to the source code and development documentation.
  • have access to the source code, but access to the development documentation.
  • None
  • UAT access to documents, but not the source code.
  • do not have access to the Application € ™ s source code and development documentation. (Correct)

Answer : do not have access to the Application € ™ s source code and development documentation.

Which of the following is most likely to be used to ensure the creation of encryption keys?


Options are :

  • Trusted Platform Module (Correct)
  • None
  • The common access card
  • Single-key
  • hashing algorithm

Answer : Trusted Platform Module

During the companyβ € ™ s transfer, the security administrator finds multiple copies of the Company directories thrown out in public dumpsters. Which of the following is the company vulnerable to attacks without adequate user training and awareness?


Options are :

  • pharming
  • scams
  • Social engineering (Correct)
  • . Brute force
  • None

Answer : Social engineering

JK0-802 CompTIA A+ Certification Exam Set 7

The company's encryption policy requires that all the encryption algorithms used in the enterprise network is a key length of 128 bits. Which of the following algorithms follow company policy?


Options are :

  • HARROW (Correct)
  • SHA
  • None
  • 3DES
  • D FLAT

Answer : HARROW

Web application has been found to be susceptible to SQL injection attacks. Which of the following best describes the necessary sanitation measures?


Options are :

  • Install host-based firewall.
  • Change Servera € ™ s SSL key, and the key to more of the previous CRL.
  • Install the missing security updates for the operating system.
  • More input validation forms. (Correct)
  • None

Answer : More input validation forms.

What can be used to provide secure tunneling services of the following?


Options are :

  • DNSSEC
  • None
  • SNMPv3
  • SNMPv2
  • IPv6 (Correct)

Answer : IPv6

Users are specific mechanisms have been told that their data is corrupted. After the recent patch to be installed on these systems, users are still reporting issues data are corrupt. Which of the following assessment techniques need to be performed to identify the problem?


Options are :

  • data integrity check
  • None
  • penetration testing
  • hardware Survey
  • vulnerability scanning (Correct)

Answer : vulnerability scanning

Which of the following is an account management principle of simplified user management?


Options are :

  • Eliminate unnecessary system accounts.
  • None
  • To ensure a minimum password length is acquired.
  • Access restrictions based on categories. (Correct)
  • To ensure password complexity requirements are met.

Answer : Access restrictions based on categories.

the security administrator to perform several wardriving routes per month and has recently been noticed in a given area, with a large number of unauthorized devices. Which of the following types of attack are most likely to occur?


Options are :

  • Bluejacking
  • disorder
  • IV attack
  • None
  • Rogue access points (Correct)

Answer : Rogue access points

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Which of the following would be the best action to perform when performing a vulnerability assessment company?


Options are :

  • Update antivirus signatures and apply the patches.
  • Consider the vulnerability of the data through the network analyzer.
  • The results of the scan to document change control board.
  • None
  • Organize information based on the severity and the value of the property. (Correct)

Answer : Organize information based on the severity and the value of the property.

Safety Partner is detected through the password verification software that most passwords can be detected by cracking the first seven characters, and then cracking the second part of the password. Which of the following is the use of the company?


Options are :

  • 3DES
  • WEP
  • MD5
  • None
  • LANMAN (Correct)

Answer : LANMAN

Which takes place most likely following when the user detects an attack packet capture on a computer connected to a wireless network?


Options are :

  • order numbers
  • . header manipulation
  • The large dump files (Correct)
  • Invalid checksums
  • None

Answer : The large dump files

Which of the following is the security check, which can take advantage of a command such as aa, ¬? To deny ip any Anya € ™?


Options are :

  • a network bridge
  • content inspection
  • VPN
  • ACL (Correct)
  • None

Answer : ACL

Which of the following access control methods to prevent the user from accessing network resources at the end of a typical change in user?


Options are :

  • Time limits (Correct)
  • password policy
  • None
  • Group policy
  • Acceptable use policy

Answer : Time limits

Virtualization technology can be implemented in a positive impact on which of the following security concepts?


Options are :

  • None
  • Non-repudiation
  • integrity
  • confidence
  • Availability (Correct)

Answer : Availability

The system monitors the resources and the starting point for web servers should use the security team members to identify:


Options are :

  • obsolete accounts in use.
  • None
  • denial-of-service conditions. (Correct)
  • Availability of the need for greater bandwidth.
  • a new server policy.

Answer : denial-of-service conditions.

Wireless base stations, which broadcast SSID is easier to do, which of the following?


Options are :

  • implement encryption
  • Physically touch the network
  • Reduce the range
  • wardriving (Correct)
  • None

Answer : wardriving

CompTIA PenTest+ Certified for Cybersecurity Professionals Set 2

The user will tell you that their system is slow and restarts on its own. The technician can remote control your computer and realize that they no longer have administrator privileges on the workstation. Which of the following is the most likely cause?


Options are :

  • adware
  • None
  • spam
  • rootkit (Correct)
  • DDoS

Answer : rootkit

Newly hired security administrator of the company suspects that the previous security administrator has left a malicious code to corrupt LOGGING 30 per day. Which of the following is suspected in the system?


Options are :

  • Trojan
  • logic bomb (Correct)
  • Virus
  • None
  • Spyware

Answer : logic bomb

The user tells us that after searching the Internet office supplies and visiting one of the sites in search engine results, they began to receive unsolicited pop-ups later visits to the website. Which of the following is the most likely cause unsolicited pop-ups?


Options are :

  • Trojan
  • Virus
  • None
  • spam
  • adware (Correct)

Answer : adware

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions