CompTIA JK0-015 E2C Security+ Certification Practice Test Set 27

Which of the following security measures may be used for 802.1x?


Options are :

  • IPSec VPN GMOs
  • None
  • Internet content filter
  • Network Access Control (Correct)
  • address conversion

Answer : Network Access Control

When managing user access to files and system resources to groups, users should be placed into groups based on which of the following?


Options are :

  • MAC, RBAC, and the IP address
  • The concept of an implicit deny, the printer's location and biometrics
  • None
  • The concept of least privilege, the need for access to, and the security role (Correct)
  • Job rotation, server, and MAC

Answer : The concept of least privilege, the need for access to, and the security role

Which of the following is the best way an attacker to hide their identity?


Options are :

  • None
  • To increase the maximum size of the log
  • shoulder surfing
  • remove Recognition (Correct)
  • Disabling cookies

Answer : remove Recognition

Which of the following is most likely to be used to transfer malicious code to a corporate network by introducing viruses during the manufacturing process?


Options are :

  • None
  • P2P software
  • BIOS chips
  • USB drives (Correct)
  • Mobile Phone

Answer : USB drives

Disabling SSID broadcast to all wireless routers network manager noticed that the same unauthorized users are increasingly accessing the network. Which of the following is not an administrator do?


Options are :

  • Refuse 802.11a network traffic
  • None
  • Enable ARP cache spoofing protection.
  • Re-enable the SSID.
  • Change the SSID. (Correct)

Answer : Change the SSID.

Which of the following describes that the risk to an acceptable level?


Options are :

  • To avoid the risk of negative
  • Take advantage of a positive risk
  • risk aversion
  • None
  • Risk mitigation measures (Correct)

Answer : Risk mitigation measures

The technician just finished will add a new server to a live environment. Which of the following would be the technician to perform next?


Options are :

  • Install operating system patches (Correct)
  • performance baseline
  • The update group policies
  • None
  • Install antivirus software

Answer : Install operating system patches

Configuring access on a need to know basis, it is best practice controls which of the following?


Options are :

  • risk assessment
  • vulnerability assessment
  • patch management,
  • account management (Correct)
  • None

Answer : account management

Most of the vulnerabilities affecting the mission of a formal risk assessment should be:


Options are :

  • Accepted
  • None
  • mitigate (Correct)
  • ignored
  • avoid

Answer : mitigate

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 1

Which of the following practices are most relevant to protection against operating system vulnerabilities?


Options are :

  • patch management, (Correct)
  • antivirus choice
  • None
  • FNetwork intrusion detection
  • Network intrusion detection

Answer : patch management,

Several machines are observed connect to a specific web server during non-working hours and receiving instructions to perform a DNS attack. Which of the following would be responsible for?


Options are :

  • logic bomb
  • botnet (Correct)
  • adware
  • None
  • Virus

Answer : botnet

Which of the following security threats most frequently used IRC to communicate with a remote host?


Options are :

  • Worm
  • phishing
  • botnets (Correct)
  • spam
  • None

Answer : botnets

Which of the following are reasons why the key may be withdrawn? (Choose two).


Options are :

  • CA compromise (Correct)
  • Lost Password
  • key Compromise (Correct)
  • The public key is revealed
  • lost confidence in

Answer : CA compromise key Compromise

The physical location of rogue access points can be detected using which of the following?


Options are :

  • To create honeypots
  • wardriving (Correct)
  • IPS
  • None
  • remote monitoring

Answer : wardriving

Which of the following security tools can be used for vulnerability scanning?


Options are :

  • Milw0rm
  • RAIN
  • None
  • L0phtcrack
  • Nessus (Correct)

Answer : Nessus

CompTIA Security+ Cert. (SY0-501): Practice Tests 2019 Set 3

Which of the following is the most commonly implemented in the transmission device logs by logging in to the server?


Options are :

  • SOCKS
  • SYSLOG (Correct)
  • SHTTP
  • None
  • SMTP

Answer : SYSLOG

Employees will not be able to open up internal company documents, because they all seem to be encrypted. The company CIO has received an e-mail asking for $ 10,000 in exchange for documents encryption key. Which of the following best describes this type of attack?


Options are :

  • ransomware (Correct)
  • rootkit attack
  • None
  • Trojan attack
  • adware

Answer : ransomware

The company is having a problem with users to set up rogue access points. Which of the following would be the best solutions for the administrator to implement?


Options are :

  • Stop SSID broadcasting
  • To implement least privilege access
  • The password policy of tempering
  • The MAC address filter (Correct)
  • None

Answer : The MAC address filter

PGP is an encryption system on the basis of the following encryption method?


Options are :

  • certificate Authority
  • asymmetric (Correct)
  • SSL
  • Symmetrical
  • None

Answer : asymmetric

Which of the following should be used to remotely check a network administrator If the workstation is running P2P applications?


Options are :

  • None
  • ping road sweeper
  • ARP scanner
  • Port scanner (Correct)
  • network mapper

Answer : Port scanner

Which of the following is the primary place where the general practice is implemented in the organization?


Options are :

  • domain (Correct)
  • operating instructions
  • security group
  • physical memory
  • None

Answer : domain

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 3

Which of the following SSH configurations to mitigate brute-force login attacks? (Choose three).


Options are :

  • Filtering based upon source address
  • Implemented using cryptographic keys (Correct)
  • The default delay on the service port
  • Disabling the default accounts (Correct)
  • Limitation of failed login attempts (Correct)
  • Enabling SSH version 2

Answer : Implemented using cryptographic keys Disabling the default accounts Limitation of failed login attempts

Which of the following security tools can view the SSIDs use of wireless networks, even if they have SSID broadcasting?


Options are :

  • None
  • NMAP (Correct)
  • RAIN
  • Netstumbler
  • kismet

Answer : NMAP

Which of the following would protect workers network traffic to non-company-owned network?


Options are :

  • VPN (Correct)
  • antivirus
  • 802.1x
  • None
  • RAIN

Answer : VPN

By limiting access to a resource file by default only the creator, is an example of the application which of the following security concepts?


Options are :

  • logical tokens
  • Role-based access control
  • behavior-based safety
  • None
  • of least privilege (Correct)

Answer : of least privilege

Which of the following is the best mitigation against DoS attacks?


Options are :

  • Distributed power sources, NAC, and VLAN (Correct)
  • Distributed, redundant data centers with IPS
  • Two-factor server authentication, NIDS, and VPNs
  • None
  • Unnecessary Internet, power supplies, and NAT

Answer : Distributed power sources, NAC, and VLAN

Which of the following is the best solution for an administrator to implement in order to learn more zeroday take advantage of the attacks on the internal network?


Options are :

  • honeypot (Correct)
  • IDS
  • HIDs
  • None
  • Stateful firewall

Answer : honeypot

BR0-002 CompTIA Network + Bridge Practice Exam Set 1

Which of the following best practices should be applied to force the resources to enforce existing information security controls?


Options are :

  • Remove unnecessary users from the rights group resources. (Correct)
  • Set the printer to standby hours.
  • Make sure that all user groups have permissions for all printers.
  • None
  • Restrict group membership for users who are often the result.

Answer : Remove unnecessary users from the rights group resources.

Which of the following is a mitigation technique that processes the signal manifestation?


Options are :

  • Installing WIDS In addition to the wireless router
  • Turning off SSID broadcast on your wireless router
  • None
  • Investing in hedge on the other side of the wireless router (Correct)
  • Configure a WPA instead of WEP wireless router

Answer : Investing in hedge on the other side of the wireless router

Which of the following is a required component for use Kerberos?


Options are :

  • certificate Authority
  • Ticket Granting Server (Correct)
  • Extensible Authentication Protocol
  • None
  • remote access server

Answer : Ticket Granting Server

Which of the following is an e-mail attack targeted at a specific individual to trick the individual into revealing personal information?


Options are :

  • Spear phishing (Correct)
  • Hoax
  • None
  • pharming
  • phishing

Answer : Spear phishing

Political Security at the enterprise level clearly that the operators of the servers do not have access to the log servers or permits to check the log files. These rights are granted only to security administrators. This policy is an example of which of the following industry best practices?


Options are :

  • The implicit deny
  • None
  • Cycle
  • privilege escalation
  • Segregation of duties (Correct)

Answer : Segregation of duties

The network administrator is alerted of a failure on a file server. Alarm option, the application is a file integrity checker. Which of the following is a potential source of this HIDs alarm?


Options are :

  • ARP poisoning
  • DDOS
  • teardrop attack
  • rootkit (Correct)
  • None

Answer : rootkit

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 1

Integrity is best provided that the following techniques?


Options are :

  • None
  • Full disk encryption
  • Asymmetric key encryption
  • digital signatures (Correct)
  • Symmetric key encryption

Answer : digital signatures

Which of the following should be taken to mitigate the security threat of adware?


Options are :

  • subnetting
  • None
  • Pop-up blocker (Correct)
  • antivirus
  • Anti-spam

Answer : Pop-up blocker

Which of the following BEST secure ingress and egress points to the data center?


Options are :

  • logbook
  • name tags
  • None
  • escorts
  • proximity cards (Correct)

Answer : proximity cards

Recovery Point Objectives and Recovery Time Objectives directly related to the BCP which of the following concepts?


Options are :

  • For Business analysis of the impact of (Correct)
  • succession planning
  • None
  • Remove single points of failure
  • Risk Management

Answer : For Business analysis of the impact of

Which of the following mitigating follow the appropriate set of data?


Options are :

  • DNS poisoning
  • None
  • rootkits
  • Cross-site scripting (Correct)
  • Open SMTP relays

Answer : Cross-site scripting

Which of the following is the most common means of ensuring the security administrator securely manage remote * NIX based systems?


Options are :

  • PPTP
  • None
  • IPSec
  • SSH (Correct)
  • SSL / TLS

Answer : SSH

SY0-401 CompTIA Security+ Certification Practice Exam Set 4

A recent risk assessment has identified vulnerabilities production servers. The technician realizes its newly re-filming component after it failed. Which of the following is the first project to assess when trying to reduce the risk?


Options are :

  • None
  • if all of the current service pack and patches, re-use, (Correct)
  • if spam filters have been properly applied
  • If all the device drivers updated
  • If the firewall ruleset does not allow incoming traffic to the vulnerable port

Answer : if all of the current service pack and patches, re-use,

Which of the following authentication models are the most vulnerable to password crackers?


Options are :

  • single factor (Correct)
  • two factors
  • three factors
  • None
  • physical tokens

Answer : single factor

Which of the following can restrict network traffic from getting on your computer?


Options are :

  • HIDs
  • None
  • NIDS
  • firewall software (Correct)
  • antivirus

Answer : firewall software

recipient's public key can be used for the data sender to make sure which of the following?


Options are :

  • confidentiality of data (Correct)
  • sender authentication
  • the anonymity of the sender
  • None
  • access to information

Answer : confidentiality of data

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions