CompTIA JK0-015 E2C Security+ Certification Practice Test Set 4

Which of the following describes a type of algorithm that cannot be reversed in order to decode the data?


Options are :

  • One Way Function
  • Pseudorandom Number Generator (PRNG)
  • Asymmetric
  • Symmetric

Answer : One Way Function

Which of the following protects the confidentiality of data by making the data unreadable to those who don't have the correct key?


Options are :

  • Hashing
  • Non-repudiation
  • Encryption
  • . Digital signatures

Answer : Encryption

A digital signature or digital signature scheme is a type of asymmetric cryptography. For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?


Options are :

  • Receivers public key
  • Receivers private key
  • Senders private key
  • Senders public key

Answer : Senders private key

Which of the following are types of certificate-based authentication? (Select TWO)


Options are :

  • Many-to-many mapping
  • One-to-one mapping
  • One-to-many mapping
  • Many-to-one mapping

Answer : One-to-one mapping Many-to-one mapping

Which key can be used by a user to log into their network with a smart card?


Options are :

  • Shared key
  • Private key
  • Cipher key
  • Public key

Answer : Private key

In computing, promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it – a feature normally used for packet sniffing. Which of the following is placed in promiscuous mode, according to the data flow, to permit a NIDS to monitor the traffic?


Options are :

  • Appliance
  • Filter
  • Console
  • Sensor

Answer : Sensor

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 20

While surfing the Internet a user encounters a pop-up window that prompts the user to download a browser plug-in. The pop-up window is a certificate which validates the identity of the plug-in developer. Which of the following BEST describes this type of certificate?


Options are :

  • Web certificate
  • Software publisher certificate
  • Certificate Authority (CA) certificate
  • Server certificate

Answer : Software publisher certificate

The first step in risk identification would be to identify:


Options are :

  • threats
  • vulnerabilities
  • costs
  • assets

Answer : assets

Which of the following statements regarding the MAC access control models is TRUE?


Options are :

  • . In the Mandatory Access Control (MAC) the owner of a resource establishes access privileges to that resource.
  • In the Mandatory Access Control (MAC) users cannot share resources dynamically.
  • The Mandatory Access Control (MAC) model is a dynamic model.
  • The Mandatory Access Control (MAC) model is not restrictive

Answer : In the Mandatory Access Control (MAC) users cannot share resources dynamically.

What should be taken into consideration while executing proper logging procedures? (Select TWO).


Options are :

  • The amount of disk space required
  • The password requirements for user accounts
  • The information that is needed to reconstruct events
  • The virtual memory allocated on the log server

Answer : The amount of disk space required The information that is needed to reconstruct events

Which security applications require frequent signature updates? (Select TWO).


Options are :

  • PKI
  • Firewall
  • IDS
  • Antivirus

Answer : IDS Antivirus

Which authentication method does the following sequence: Logon request, encrypts value response, server, challenge, compare encrypts results, authorize or fail referred to?


Options are :

  • Kerberos
  • Security Tokens
  • Certificates
  • CHAP

Answer : CHAP

CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 1

Choose the mechanism that is NOT a valid access control mechanism.


Options are :

  • SAC (Subjective Access Control) list.
  • DAC (Discretionary Access Control) list.
  • RBAC (Role Based Access Control) list.
  • MAC (Mandatory Access Control) list

Answer : SAC (Subjective Access Control) list.

Which one of the following options is a vulnerability assessment tool?


Options are :

  • Nessus
  • Cain Abel
  • John the Ripper
  • AirSnort

Answer : Nessus

Which of the following would be an example of a high-availability disk technology?


Options are :

  • RAID
  • Clustering
  • Remote access
  • Load balancing

Answer : RAID

The term tunneling protocol is used to describe when one network protocol called the payload protocol is encapsulated within a different delivery protocol. Which of the following can be used to institute a tunneling protocol for security?


Options are :

  • IPX/SPX
  • IPSec
  • FTP
  • 341
  • EAP

Answer : IPX/SPX

During a live response to an unauthorized access, a forensics specialist executes a command on the computer being investigated. Which of the following commands would be used to display the current network connections on the local computer?


Options are :

  • IPCONFIG / IFCONFIG
  • NETSTAT
  • nmap
  • netcat

Answer : NETSTAT

Which intrusion detection system will use well defined models of how an attack occurs?


Options are :

  • Anomaly
  • Protocol
  • Signature
  • Behavior

Answer : Signature

220-802 CompTIA A+ Certification Practice Exam Set 4

Secret Key encryption is also known as:


Options are :

  • one way function
  • symmetrical
  • replay
  • asymmetrical

Answer : symmetrical

In computer security, an access control list (ACL) is a list of permissions attached to an object. Which log will reveal activities about ACL?


Options are :

  • Firewall
  • Mobile device
  • Performance
  • Transaction

Answer : Firewall

For the following items, which one is a collection of server’s setup to attract hackers?


Options are :

  • DMZ
  • VLAN
  • Honeypo
  • Honeynet

Answer : Honeynet

The ability to logon to multiple systems with the same credentials is typically known as:


Options are :

  • centralized management
  • Role Based Access Control (RBAC)
  • single sign-on
  • . decentralized management

Answer : single sign-on

Which description is true about how to accomplish steganography in graphic files?


Options are :

  • Replacing the least significant bit of each byte
  • Replacing the most significant byte of each bit
  • Replacing the most significant bit of each byte
  • Replacing the least significant byte of each bit

Answer : Replacing the least significant bit of each byte

A public key _____________ is a pervasive system whose services are implemented and delivered using public key technologies that include Certificate Authority (CA), digital certificates, non-repudiation, and key history management.


Options are :

  • distribution authority
  • exchange
  • infrastructure
  • cryptography scheme

Answer : infrastructure

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 24

Why does a technician use a password cracker?


Options are :

  • To look for weak passwords on the network
  • To enforce password complexity requirements
  • To change a users passwords when they leave the company
  • To change users passwords if they have forgotten them

Answer : To look for weak passwords on the network

Which system is setup to distract potential attackers?


Options are :

  • Firewall
  • DMZ
  • Honeypo
  • VLAN

Answer : Honeypo

A user has a sensitive message that needs to be sent in via email. The message needs to be protected from interception. Which of the following should be used when sending the email?


Options are :

  • Non-repudiation
  • Encryption
  • Social engineering
  • . Digital signatures

Answer : Encryption

The DAC (Discretionary Access Control) model has an inherent flaw. Choose the option that describes this flaw.


Options are :

  • The DAC (Discretionary Access Control) model uses only the identity of the user or specific process to control access to a resource. This creates a security loophole for Trojan horse attacks.
  • The DAC (Discretionary Access Control) model does not have any known security flaws.
  • The DAC (Discretionary Access Control) model uses certificates to control access to resources. This creates an opportunity for attackers to use your certificates.
  • The DAC (Discretionary Access Control) model does not use the identity of a user to control access to resources. This allows anyone to use an account to access resources.

Answer : The DAC (Discretionary Access Control) model uses only the identity of the user or specific process to control access to a resource. This creates a security loophole for Trojan horse attacks.

Which item specifies a set of consistent requirements for a workstation or server?


Options are :

  • Configuration baseline
  • Patch management
  • Imaging software
  • Vulnerability assessment

Answer : Configuration baseline

What are the best practices while installing and securing a new system for a home user? (Select THREE).


Options are :

  • Use a strong firewall.
  • Apply all service packs.
  • Apply all system patches.
  • Install remote control software.

Answer : Use a strong firewall. Apply all service packs. Apply all system patches.

CompTIA HT0-201 DHTI+ Certification Practice Exam Set 2

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions