CompTIA JK0-015 E2C Security+ Certification Practice Test Set 6

Which of the following is used to encrypt the data sent from the server to the browser in an SSL session?


Options are :

  • Public key
  • Symmetric encryption
  • Private key
  • Asymmetric encryption

Answer : Symmetric encryption

Which of the following is a valid two-factor authentication model?


Options are :

  • Retina scan and palm print
  • Smartcard and hardware token
  • User password and user PIN
  • Iris scan and user password

Answer : Iris scan and user password

A company has implemented a policy stating that users will only receive access to the systems needed to perform their job duties. This is an example of:


Options are :

  • concurrent session control
  • separation of duties
  • least privilege
  • access control

Answer : access control

Which of the following is the process by which encryption keys are distributed?


Options are :

  • Key escrow
  • Trusted Platform Module (TPM)
  • Key management
  • User access and rights review

Answer : Key management

Which of the following logs would a system administrator scan to reveal names and IP addresses of all websites visited by a company's employees?


Options are :

  • Security log
  • Firewall logs
  • DHCP logs
  • DNS log

Answer : DNS log

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 7

Why implement security logging on a DNS server?


Options are :

  • To monitor unauthorized zone transfers
  • To measure the DNS server performance
  • To perform penetration testing on the DNS server
  • To control unauthorized DNS DoS

Answer : To monitor unauthorized zone transfers

After analyzing vulnerability and applying a security patch, which non-intrusive action should be taken to verify that the vulnerability was truly removed?


Options are :

  • Perform a penetration test.
  • Apply a security patch from the vendor.
  • Repeat the vulnerability scan.
  • Update the antivirus definition file.

Answer : Repeat the vulnerability scan.

For the following sites, which one has the means (e.g. equipment, software, and communications) to facilitate a full recovery within minutes?


Options are :

  • Hot site
  • Reciprocal site
  • Warm site
  • Cold sit

Answer : Hot site

You work as a network administrator for your company. Your company requires you to improve the physical security of a data center located inside the office building. The data center already maintains a physical access log and has a video surveillance system. Which additional control can be performed?


Options are :

  • Mantrap
  • Logical token
  • ACL
  • Defense-in-depth

Answer : Mantrap

You work as a network administrator for your company. Taking personal safety into consideration, what fire suppression substances types can effectively prevent damage to electronic equipment?


Options are :

  • Water
  • Foam
  • CO
  • Halon

Answer : CO

A user contacts technical support stating they received notification in a web browser that their computer is infected with a virus. Which of the following would help prevent this in the future?


Options are :

  • Anti-Spyware
  • Pop-up blocker
  • Spam blocker
  • Antivirus

Answer : Pop-up blocker

220-701 A+ Essentials Certification Practice Exam Set 1

Which of the following should be performed during a forensic evaluation?


Options are :

  • Update virus definitions
  • Establish chain of custody.
  • Power off the system.
  • Troubleshoot system performance

Answer : Establish chain of custody.

A programmer plans to change the server variable in the coding of an authentication function for a proprietary sales application. Which process should be followed before implementing the new routine on the production application server?


Options are :

  • Chain of custody
  • Secure disposal
  • Password complexity
  • Change management

Answer : Change management

Which of the following is the MOST secure condition a firewall should revert to when it is overloaded with network traffic?


Options are :

  • Fail open
  • Fail safe
  • Fail dange
  • Fail closed

Answer : Fail closed

Which of the following sequences is correct regarding the flow of the CHAP system?


Options are :

  • Logon request, encrypts value response, server, challenge, compare encrypts results, authorize or fail
  • Logon request, challenge, encrypts value response, server, compare encrypted results, authorize or fail
  • Logon request, server, encrypts value response, challenge, compare encrypted results, authorize or fail
  • Logon request, challenge, server, encrypts value response, compare encrypted results, authorize or fail

Answer : Logon request, challenge, encrypts value response, server, compare encrypted results, authorize or fail

You work as a network technician. You have been asked to reconstruct the infrastructure of an organization. You should make sure that the virtualization technology is implemented securely. What should be taken into consideration while implementing virtualization technology?


Options are :

  • The technician should perform penetration testing on all the virtual servers to monitor performance.
  • The technician should verify that the virtual servers and the host have the latest service packs and patches applied.
  • The technician should subnet the network so each virtual server is on a different network segment
  • The technician should verify that the virtual servers are dual homed so that traffic is securely separated.

Answer : The technician should verify that the virtual servers and the host have the latest service packs and patches applied.

Which of the following actions is an employee able to take if they are given administrative access to a workstation


Options are :

  • Installing applications on remote systems, creating local user accounts, and modifying accounts they created.
  • Installing applications, creating local user accounts, and modifying any accounts on the domain.
  • Upgrading the operating system, creating local user accounts, and modifying any accounts on the system.
  • Upgrading the operating system, creating local user accounts, and modifying accounts on the network.

Answer : Upgrading the operating system, creating local user accounts, and modifying any accounts on the system.

220-701 A+ Essentials Certification Practice Exam Set 10

Which of the following logs contains user logons and logoffs?


Options are :

  • Security
  • DNS
  • Application
  • System

Answer : Security

Which method is LEAST intrusive to check the environment for known software flaws?


Options are :

  • Protocol analyzer
  • Penetration test
  • Port scanne
  • Vulnerability scann

Answer : Vulnerability scann

Which item best describes an instance where a biometric system identifies legitimate users as being unauthorized?


Options are :

  • False acceptance
  • False negative
  • False positive
  • False rejection

Answer : False rejection

Which algorithms can best encrypt large amounts of data?


Options are :

  • Asymmetric key algorithms
  • Symmetric key algorithms
  • Hashing algorithms
  • ECC algorithms

Answer : Symmetric key algorithms

One of the primary purposes of virtualization in a data center is to reduce which of the following?


Options are :

  • Total complexity of the overall security architecture
  • Number of logical hosts providing services for users
  • Amount of application logging required for security
  • Volume of physical equipment needing to be secured

Answer : Volume of physical equipment needing to be secured

On the topic of the DAC (Discretionary Access Control) model, choose the statement(s) which are TRUE.


Options are :

  • All files that do not have a specified owner cannot be modified.
  • The operating system is an owner of all objects.
  • The system administrator is an owner of all objects.
  • All objects have an owner, and this owner has full control over that specific object.

Answer : All objects have an owner, and this owner has full control over that specific object.

220-701 A+ Essentials Certification Practice Exam Set 11

Users report that websites are loading slowly. Which of the following web proxy logs is MOST likely to help a system administrator identify the cause for slow web traffic?


Options are :

  • Security
  • System
  • Performance
  • Access

Answer : Performance

Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?


Options are :

  • Kiting
  • Virtualization
  • Intrusion detection
  • Cloning

Answer : Virtualization

Choose the access control model that allows access control determinations to be performed based on the security labels associated with each user and each data item.


Options are :

  • LBACs (List Based Access Control) method
  • DACs (Discretionary Access Control) method
  • RBACs (Role Based Access Control) method
  • MACs (Mandatory Access Control) method

Answer : MACs (Mandatory Access Control) method

The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates. An executive uses PKI to encrypt sensitive emails sent to an assistant. In addition to encrypting the body of the email, the executive wants to encrypt the signature so that the assistant can verify that the email actually came from the executive. Which asymmetric key should be used by the executive to encrypt the signature?


Options are :

  • Hash
  • Public
  • Shared
  • Private

Answer : Private

Which of the following is the process of trying to locate unsecured wireless networks?


Options are :

  • Net hacking
  • War driving
  • Spoofing
  • War dialing

Answer : War driving

Which encryption method is often used along with L2TP?


Options are :

  • 3DES
  • S/MIME
  • SSH
  • IPSec

Answer : IPSec

220-701 A+ Essentials Certification Practice Exam Set 12

Which of the following BEST describes when code that is initiated on a virtual machine directly affects the host?


Options are :

  • VM escape
  • VM cluster
  • VM hardware abstraction
  • VM hypervisor

Answer : VM escape

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions