CompTIA JK0-015 E2C Security+ Certification Practice Test Set 2

Which of the following is an example of allowing a user to perform a self-service password reset?


Options are :

  • Password complexity
  • Password length
  • Password recovery (Correct)
  • Password expiration

Answer : Password recovery

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 11

The company encryption policy requires all encryption algorithms used on the corporate network to have a key length of 128-bits. Which of the following algorithms would adhere to company policy?


Options are :

  • SHA
  • DES
  • AES (Correct)
  • 3DES

Answer : AES

A security engineer is deploying a new CA. Which of the following is the BEST strategy for the root CA after deploying an intermediate trusted CA?


Options are :

  • It should be shut down and kept in a secure location. (Correct)
  • It should be placed outside of the firewall.
  • It should be placed within an internal network.
  • It should be placed in the DMZ.

Answer : It should be shut down and kept in a secure location.

A system administrator was recently laid off for compromising various accounting systems within the company. A few months later, the finance department reported their applications were not working correctly. Upon further investigation, it was determined that unauthorized accounting software was installed onto a financial system and several application exploits existed within that system. This is an example of which of the following?


Options are :

  • Logic bomb
  • Worm
  • Trojan horse (Correct)
  • Rootkit

Answer : Trojan horse

Practice Exam : CompTIA A+ Certification 220-902

Which of the following is an example of requiring users to have a password of 16 characters or more?


Options are :

  • Password complexity requirements
  • Password length requirements (Correct)
  • Password expiration requirements
  • Password recovery requirements

Answer : Password length requirements

Which of the following is an example of forcing users to change their password every 90 days?


Options are :

  • Password recovery requirements
  • Password expiration requirements (Correct)
  • Password length requirements
  • Password complexity requirements

Answer : Password expiration requirements

Which of the following can be deployed to provide secure tunneling services?


Options are :

  • IPv6 (Correct)
  • SNMPv2
  • DNSSEC
  • SNMPv3

Answer : IPv6

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

Which of the following security controls should be implemented to prevent server administrators from accessing information stored within an application on a server?


Options are :

  • Implicit deny
  • Change management
  • Full disk encryption
  • File encryption (Correct)

Answer : File encryption

Which of the following is susceptible to reverse lookup attacks if not configured properly?


Options are :

  • SSL
  • DNS (Correct)
  • IPSec
  • ICMP

Answer : DNS

Which of the following is MOST likely to reduce the threat of a zero day vulnerability?


Options are :

  • Disabling unnecessary services (Correct)
  • Network-based intrusion detection system
  • Host-based intrusion detection system
  • Patch management

Answer : Disabling unnecessary services

SY0-401 CompTIA Security+ Certification Practice Exam Set 2

A user browsing the Internet sees a message on a webpage indicating their computer is infected. The message states that antivirus software should be downloaded from the site to clean the infection. Which of the following is occurring in this situation?


Options are :

  • Social engineering (Correct)
  • Adware
  • Botnet
  • Trojan

Answer : Social engineering

Which of the following is a security best practice when an employee leaves the company?


Options are :

  • Account reissue
  • Account disablement (Correct)
  • Account password recovery
  • Account password complexity

Answer : Account disablement

Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?


Options are :

  • Error and exception handling
  • LDAP injection
  • Cross-site scripting (Correct)
  • SQL injection

Answer : Cross-site scripting

Comptia Linux+ LX0-103 Certification Exam Practice Test Set 1

During the analysis of malicious code, a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?


Options are :

  • Distributed denial of service
  • SQL injection
  • Buffer overflow (Correct)
  • XML injection

Answer : Buffer overflow

Which of the following can be used to verify the integrity of a message’s content as well as the identity of the sender?


Options are :

  • Recovery agent
  • Key escrow
  • Digital signature (Correct)
  • Trust models

Answer : Digital signature

Which of the following should be checked for when conducting a wireless audit? (Select TWO)


Options are :

  • Open proxies
  • Antenna placement (Correct)
  • Encryption of wireless traffic (Correct)
  • URL filtering
  • Open relays

Answer : Antenna placement Encryption of wireless traffic

JK0-802 CompTIA A+ Certification Exam Set 7

Which of the following describes the direction the signal will emanate from if a wireless omni-directional antenna is placed parallel to the floor?


Options are :

  • In a downward direction, perpendicular to the floor
  • Up and down, perpendicular to the floor (Correct)
  • Directly from the point of the antenna, parallel to the floor
  • Side to side, parallel with the floor

Answer : Up and down, perpendicular to the floor

If a security administrator is reviewing a JPEG’s metadata and hash against an unverified copy of the graphic, which of the following is the administrator looking for?


Options are :

  • Whole disk encryption
  • Digital signatures
  • Chain of custody
  • Steganography (Correct)

Answer : Steganography

Which of the following is a security control that can utilize a command such as a€?deny ip any any’?


Options are :

  • ACL (Correct)
  • VPN
  • Content inspection
  • Network bridge

Answer : ACL

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 12

Which of the following MOST likely occurs when a user discovers a packet capture attack on a computer connected to a wireless network?


Options are :

  • . Header manipulation
  • Invalid checksums
  • Sequence numbers
  • Large dump files (Correct)

Answer : Large dump files

Which of the following is BEST described as a scenario where organizational management decides not to provide a service offering because it presents an unacceptable risk to the organization?


Options are :

  • Acceptance
  • Avoidance (Correct)
  • Mitigation
  • Deterrence

Answer : Avoidance

SY0-401 CompTIA Security+ Certification Practice Exam Set 7

When granting access, which of the following protocols uses multiple-challenge responses for authentication, authorization and audit?


Options are :

  • RADIUS
  • TACACS
  • LDAP
  • TACACS+ (Correct)

Answer : TACACS+

An attacker incorrectly submits data on a website’s form and is able to determine the type of database used by the application and the SQL statements used to query that database. Which of the following is responsible for this information disclosure?


Options are :

  • Error handling (Correct)
  • Fuzzing
  • XSS
  • SQL injection

Answer : Error handling

Which of the following protocols implements security at the lowest OSI layer?


Options are :

  • IPSec (Correct)
  • SSH
  • SSL
  • ICMP

Answer : IPSec

Comptia A+ (220-801) Certification Exam Practice Test Set 5

An security administrator shows a user a method of hiding information by printing text so small that it appears as a period or colon. Which of the following BEST describes this security type?


Options are :

  • Quantum cryptography
  • Hashing
  • Steganography (Correct)
  • Transport encryption

Answer : Steganography

Which of the following is the primary purpose of using a digital signature? (Select TWO).


Options are :

  • Encryption
  • Confidentiality
  • Non-repudiation (Correct)
  • Availability
  • Integrity (Correct)

Answer : Non-repudiation Integrity

Which of the following is the primary security reason why social networking sites should be blocked in a large corporation?


Options are :

  • The proxy server needs to be specially configured for all social networking sites.
  • The data traffic can cause system strain and can overwhelm the firewall rule sets.
  • The users can unintentionally post sensitive company information. (Correct)
  • The users’ work productivity decreases greatly.

Answer : The users can unintentionally post sensitive company information.

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 10

An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?


Options are :

  • Web security gateway
  • VPN concentrator (Correct)
  • Mandatory Access Control (MAC)
  • Software based firewall

Answer : VPN concentrator

Which of the following controls would the security administrator implement if clients have to use at least ten upper and lower case alpha-numeric characters and special symbols?


Options are :

  • File encryption strength
  • Username lockout
  • Account disablement
  • Password complexity (Correct)

Answer : Password complexity

Upper management decides which risk to mitigate based on cost. This is an example of:


Options are :

  • business impact analysis
  • quantitative risk assessment (Correct)
  • risk management framework.
  • qualitative risk assessment.

Answer : quantitative risk assessment

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions