CompTIA JK0-015 E2C Security+ Certification Practice Test Set 5

A technician needs to allow seven specific users connection to a new access point. Which of the following should be performed to achieve this action?


Options are :

  • Disable SSID broadcast
  • Adjust antenna placement
  • Decrease WAP power levels
  • Enable MAC filtering (Correct)

Answer : Enable MAC filtering

Which of the following is the MOST secure method of utilizing FTP?


Options are :

  • SCP
  • FTP active
  • FTP passive
  • FTPS (Correct)

Answer : FTPS

Which of the following cloud computing concepts is BEST described as providing an easy-to-configure OS and on-demand computing for customers?


Options are :

  • Platform as a Service (Correct)
  • Software as a Service
  • Trusted OS as a Service
  • Infrastructure as a Service

Answer : Platform as a Service

Which of the following port numbers is used for SCP, by default?


Options are :

  • 80
  • 443
  • 22 (Correct)
  • 69

Answer : 22

In an 802.11n network, which of the following provides the MOST secure method of both encryption and authorization?


Options are :

  • WPA Enterprise (Correct)
  • WEP with 802.1x
  • WPA2-PSK
  • WPA with TKIP

Answer : WPA Enterprise

Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?


Options are :

  • Load balancer (Correct)
  • Protocol analyzer
  • VPN concentrator
  • URL filter

Answer : Load balancer

Which of the following is used in conjunction with PEAP to provide mutual authentication between peers?


Options are :

  • MSCHAPv1
  • PPP
  • MSCHAPv2 (Correct)
  • LEAP

Answer : MSCHAPv2

Which of the following should be performed before a hard drive is analyzed with forensics tools?


Options are :

  • Capture system image (Correct)
  • Identify user habits
  • Interview witnesses
  • Disconnect system from network

Answer : Capture system image

A security administrator is in charge of a datacenter, a hot site and a cold site. Due to a recent disaster, the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensure is in place for a cold site?


Options are :

  • Location that meets power and connectivity requirements (Correct)
  • Location with all required equipment loaded with all current patches and updates
  • Location near the datacenter that meets power requirements
  • Location with duplicate systems found in the datacenter

Answer : Location that meets power and connectivity requirements

Information classification is used to protect which of the following?


Options are :

  • Clustering
  • Phishing attacks
  • Sensitive data (Correct)
  • Best practices

Answer : Sensitive data

Which of the following devices should be used to allow secure remote network access for mobile users?


Options are :

  • Protocol analyzer
  • VPN concentrator (Correct)
  • NIDS
  • SFTP

Answer : VPN concentrator

Which of the following ports are used for NetBIOS by default? (Select TWO).


Options are :

  • 139 (Correct)
  • 143
  • 443
  • 135
  • 445 (Correct)

Answer : 139 445

Upon investigation, an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?


Options are :

  • Logic bomb
  • Trojan
  • Rootkit (Correct)
  • Virus

Answer : Rootkit

Which of the following business continuity activities would a company implement in order to restore a critical system after a disruption or failure?


Options are :

  • Business continuity testing
  • Continuity of day to day operations
  • Disaster recovery (Correct)
  • Succession planning

Answer : Disaster recovery

A security administrator must implement AES encryption throughout a companyís wireless network. Which of the following MUST be configured?


Options are :

  • TKIP
  • CCMP (Correct)
  • WPA
  • 802.11n

Answer : CCMP

Which of the following will teach employees about malicious attempts from an attacker to obtain bank account information?


Options are :

  • Password complexity requirements
  • Handling PII
  • Tailgating techniques
  • Phishing techniques (Correct)

Answer : Phishing techniques

User awareness training about proper disclosure of information, handling of corporate data, and security policies is important due to the popularity of which of the following?


Options are :

  • Virtual private networks
  • Social networking sites (Correct)
  • Zero day exploits
  • Wireless networks

Answer : Social networking sites

Which of the following methods of access, authentication, and authorization is the MOST secure by default?


Options are :

  • RADIUS
  • TACACS
  • LDAP
  • Kerberos (Correct)

Answer : Kerberos

Which of the following is the MOST appropriate risk mitigation strategy to use in order to identify an unauthorized administrative account?


Options are :

  • Routine audits of system logs
  • Incident management
  • Change management
  • Userís rights and permissions review (Correct)

Answer : Userís rights and permissions review

Which of the following devices is typically used at the enclave boundary to inspect, block, and re-route network traffic for security purposes?


Options are :

  • Load balancers
  • Protocol analyzers
  • Firewalls (Correct)
  • Spam filter

Answer : Firewalls

IPSec has been chosen for remote access VPN connections for telecommuters. Which of the following combinations would BEST secure the connection?


Options are :

  • Transport mode, AH
  • Tunnel mode, ESP (Correct)
  • Tunnel mode, AH
  • Transport mode, ESP

Answer : Tunnel mode, ESP

Which of the following prevents numerous SYN packets from being accepted by a device?


Options are :

  • Flood guards (Correct)
  • Transport encryption
  • Implicit deny
  • VLAN management

Answer : Flood guards

Which of the following concepts ensures that the data is only viewable to authorized users?


Options are :

  • Biometrics
  • Confidentiality (Correct)
  • Integrity
  • Availability

Answer : Confidentiality

Which of the following stops malicious traffic from affecting servers?


Options are :

  • Protocol analyzers
  • Sniffers
  • NIPS (Correct)
  • NIDS

Answer : NIPS

Actively monitoring data streams in search of malicious code or behavior is an example of


Options are :

  • load balancing
  • URL filtering.
  • an Internet proxy.
  • content inspection. (Correct)

Answer : content inspection.

Which of the following requires special handling and explicit policies for data retention and data distribution?


Options are :

  • Personally identifiable information (Correct)
  • Zero day exploits
  • Phishing attacks
  • Personal electronic devices

Answer : Personally identifiable information

Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?


Options are :

  • Firewall
  • IDS (Correct)
  • Malware inspection
  • Spam filter

Answer : IDS

Which of the following technologies is used to verify that a file was not altered?


Options are :

  • MD5 (Correct)
  • AE5
  • DES
  • RC5

Answer : MD5

Which of the following systems implements a secure key distribution system that relies on hardcopy keys intended for individual sessions?


Options are :

  • PGP/GPG
  • One-time pads (Correct)
  • Blowfish
  • PKI

Answer : One-time pads

An offsite location containing the necessary hardware without data redundancy would be an example of which of the following off-site contingency plans?


Options are :

  • Cold site
  • Hot site
  • Cluster
  • Warm site (Correct)

Answer : Warm site

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions