CompTIA JK0-015 E2C Security+ Certification Practice Test Set 3

Which option is not an organizational policy that reduces the impact of fraud?


Options are :

  • job rotation.
  • separation of duties.
  • password complexity rules.
  • . escorting procedures

Answer : password complexity rules.

Which description is correct about authentication headers (AH)?


Options are :

  • The authentication information may be the same on different packets if the integrity remains in place.
  • The authentication information hash will remain the same if the bytes change on transfer.
  • The authentication information is a keyed hash based on all of the bytes in the packet.
  • The authentication information hash will increase by one if the bytes remain the same on transfer.

Answer : The authentication information is a keyed hash based on all of the bytes in the packet.

The IPSec Security Association is managed by


Options are :

  • ISAKMP
  • EEE
  • AH
  • ESP

Answer : ISAKMP

In computer networking, network address translation (NAT) is the process of modifying network address information in datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another. Which description is true about a static NAT?


Options are :

  • A static NAT uses a one to one mapping.
  • A static NAT uses a many to one mapping.
  • A static NAT uses a many to many mapping.
  • A static NAT uses a one to many mapping.

Answer : A static NAT uses a one to one mapping.

Which key is generally applied FIRST to a message digest to provide non-repudiation by use of asymmetric cryptography?


Options are :

  • Public key of the receiver
  • Private key of the sender
  • Public key of the sender
  • Private key of the receiver

Answer : Private key of the sender

Communication is important to maintaining security because communication keeps:


Options are :

  • the IT security budget justified
  • law enforcement informed of what is being done
  • the user community informed of threats
  • the network bandwidth usage under control

Answer : the user community informed of threats

CompTIA N10-004 Network+ Certification Practice Test Set 9

A user receives an email asking the user to reset the online banking username and password. The email contains a link and when the user accesses the link, the URL that appears in the browser does not match the link. This would be an example of:


Options are :

  • phishing
  • hijacking
  • spoofing
  • redirecting

Answer : phishing

Which of the following access control models uses roles to determine access permissions?


Options are :

  • DAC
  • None of the above
  • MAC
  • RBAC

Answer : RBAC

Why implement virtualization technology? (Select TWO).


Options are :

  • To eliminate virtual redundancy
  • To provide a secure virtual environment for testing
  • To reduce recovery time in the event of application failure
  • To decrease access to security resources

Answer : To provide a secure virtual environment for testing To reduce recovery time in the event of application failure

Message authentication codes are used to provide which service?


Options are :

  • Integrity
  • Fault recover
  • Key recovery
  • Acknowledgement

Answer : Integrity

Which of the following can help an administrator to implement a procedure to control inbound and outbound traffic on a network segment?


Options are :

  • Proxy
  • HIDS
  • ACL
  • NIDS

Answer : ACL

What is steganography primarily used for?


Options are :

  • Message digest
  • Hide information
  • Encrypt information
  • Data integrity

Answer : Hide information

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 4

Identify the service provided by message authentication code (MAC) hash:


Options are :

  • integrity
  • fault tolerance.
  • data recovery.
  • key recovery.

Answer : integrity

In computing, virtualization is a broad term that refers to the abstraction of computer resources. Which is a security reason to implement virtualization throughout the network infrastructure?


Options are :

  • To isolate the various network services and roles
  • To analyze the various network traffic with protocol analyzers
  • To centralize the patch management of network servers
  • To implement additional network services at a lower cost

Answer : To isolate the various network services and roles

The Lightweight Directory Access Protocol or LDAP is an application protocol for querying and modifying directory services running over TCP/IP. A user needs to implement secure LDAP on the network. Which port number will secure LDAP use by default?


Options are :

  • 636
  • 389
  • 443
  • 53

Answer : 636

Which of the following can be used by an administrator to proactively collect information on attackers and their attempted methods of gaining access to the internal network?


Options are :

  • Honeypot
  • NIPS
  • NIDS
  • DMZ

Answer : Honeypot

Virtualized applications, such as virtualized browsers, can protect the underlying operating system from which of the following?


Options are :

  • Phishing and spam attacks
  • DDoS attacks against the underlying OS
  • Virtualized applications, such as virtualized browsers, can protect the underlying operating system from which of the following?
  • Man-in-the-middle attacks

Answer : Virtualized applications, such as virtualized browsers, can protect the underlying operating system from which of the following?

For the following items, which is a protocol analyzer?


Options are :

  • WireShark
  • John the Ripper
  • Nessus
  • Cain Abel

Answer : WireShark

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 6

John works as a network administrator for his company. He uses a tool to check SMTP, DNS, POP3, and ICMP packets on the network. This is an example of which of the following?


Options are :

  • A penetration test
  • A port scanner
  • A vulnerability scan
  • A protocol analyzer

Answer : A protocol analyzer

For the following items, which is a security limitation of virtualization technology?


Options are :

  • If an attack occurs, it could potentially disrupt multiple servers.
  • Patch management becomes more time consuming.
  • A compromise of one instance will immediately compromise all instances.
  • It increases false positives on the NIDS.

Answer : If an attack occurs, it could potentially disrupt multiple servers.

Most current encryption schemes are based on:


Options are :

  • algorithms
  • randomizing
  • time stamps
  • digital rights management

Answer : algorithms

In computing, a Uniform Resource Locator (URL) is a type of Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it. When a user attempts to go to a website, he notices the URL has changed, which attack will MOST likely cause the problem?


Options are :

  • DNS poisoning
  • ARP poisoning
  • DDoS attack
  • DLL injection

Answer : DNS poisoning

Which of the following statements is TRUE regarding the CHAP authentication system?


Options are :

  • The authentication process uses a Key Distribution Center (KDC) to orchestrate the entire process. The KDC authenticates the network. Principles can be users, programs, or systems. The KDC provides a ticket to the network. Once this ticket is issued, it can be used to authenticate against other principles. This occurs automatically when a request or service is performed by another network.
  • A certificate being handed from the server to the client once authentication has been established. If you have a pass, you can wander throughout the network. BUT limited access is allowed.
  • The initiator sends a logon request from the client to the server. The server sends a challenge back to the client. The challenge is encrypted and then sent back to the server. The server compares the value from the client and if the information matches, the server grants authorization. If the response fails, the session fails and the request phase starts over
  • If your token does not grant you access to certain information, that information will either not be displayed or your access will be denied. The authentication system creates a token every time a user or a session begins. At the completion of a session, the token is destroyed

Answer : The initiator sends a logon request from the client to the server. The server sends a challenge back to the client. The challenge is encrypted and then sent back to the server. The server compares the value from the client and if the information matches, the server grants authorization. If the response fails, the session fails and the request phase starts over

Documentation describing a group expected minimum behavior is known as:


Options are :

  • the separation of duties
  • the need to know
  • a code of ethics
  • acceptable usage

Answer : a code of ethics

220-701 A+ Essentials Certification Practice Exam Set 5

A company wants to monitor all network traffic as it traverses their network. Which item will be used by the technician?


Options are :

  • HIDS
  • Protocol analyzer
  • Honeypot
  • Content filter

Answer : Protocol analyzer

The MOST common Certificate Server port required for secure web page access is port:


Options are :

  • 443
  • 80
  • 446
  • 25

Answer : 443

Which tool can help the technician to find all open ports on the network?


Options are :

  • Protocol analyze
  • Performance monitor
  • Router ACL
  • Network scanner

Answer : Network scanner

Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Which of the following is considered the weakest encryption?


Options are :

  • AES
  • SHA
  • RSA
  • DES

Answer : DES

Which description is correct about a virtual server implementation attack?


Options are :

  • OS kernel will affect all virtual instances.
  • disk partition will affect all virtual instances
  • system registry will affect all virtual instances.
  • RAM will affect all virtual instances

Answer : RAM will affect all virtual instances

Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people. Which encryption is the strongest by use of mathematical evaluation techniques?


Options are :

  • ROT13
  • AES
  • 3DES
  • DES

Answer : AES

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 6

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions