CompTIA JK0-015 E2C Security+ Certification Practice Test Set 5

A technician needs to allow seven specific users connection to a new access point. Which of the following should be performed to achieve this action?

Options are :

  • Disable SSID broadcast
  • Adjust antenna placement
  • Decrease WAP power levels
  • Enable MAC filtering

Answer : Enable MAC filtering

Which of the following is the MOST secure method of utilizing FTP?

Options are :

  • SCP
  • FTP active
  • FTP passive
  • FTPS

Answer : FTPS

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 7

Which of the following cloud computing concepts is BEST described as providing an easy-to-configure OS and on-demand computing for customers?

Options are :

  • Platform as a Service
  • Software as a Service
  • Trusted OS as a Service
  • Infrastructure as a Service

Answer : Platform as a Service

Which of the following port numbers is used for SCP, by default?

Options are :

  • 80
  • 443
  • 22
  • 69

Answer : 22

In an 802.11n network, which of the following provides the MOST secure method of both encryption and authorization?

Options are :

  • WPA Enterprise
  • WEP with 802.1x
  • WPA2-PSK
  • WPA with TKIP

Answer : WPA Enterprise

220-702 CompTIA A+ Practical Application Practice Exam Set 12

Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?

Options are :

  • Load balancer
  • Protocol analyzer
  • VPN concentrator
  • URL filter

Answer : Load balancer

Which of the following is used in conjunction with PEAP to provide mutual authentication between peers?

Options are :

  • MSCHAPv1
  • PPP
  • MSCHAPv2
  • LEAP

Answer : MSCHAPv2

Which of the following should be performed before a hard drive is analyzed with forensics tools?

Options are :

  • Capture system image
  • Identify user habits
  • Interview witnesses
  • Disconnect system from network

Answer : Capture system image

CompTIA SY0-401 Security Certification Practice Exam Set 10

A security administrator is in charge of a datacenter, a hot site and a cold site. Due to a recent disaster, the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensure is in place for a cold site?

Options are :

  • Location that meets power and connectivity requirements
  • Location with all required equipment loaded with all current patches and updates
  • Location near the datacenter that meets power requirements
  • Location with duplicate systems found in the datacenter

Answer : Location that meets power and connectivity requirements

Information classification is used to protect which of the following?

Options are :

  • Clustering
  • Phishing attacks
  • Sensitive data
  • Best practices

Answer : Sensitive data

Which of the following devices should be used to allow secure remote network access for mobile users?

Options are :

  • Protocol analyzer
  • VPN concentrator
  • NIDS
  • SFTP

Answer : VPN concentrator

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 8

Which of the following ports are used for NetBIOS by default? (Select TWO).

Options are :

  • 139
  • 143
  • 443
  • 135
  • 445

Answer : 139 445

Upon investigation, an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?

Options are :

  • Logic bomb
  • Trojan
  • Rootkit
  • Virus

Answer : Rootkit

Which of the following business continuity activities would a company implement in order to restore a critical system after a disruption or failure?

Options are :

  • Business continuity testing
  • Continuity of day to day operations
  • Disaster recovery
  • Succession planning

Answer : Disaster recovery

CompTIA 220-801 A+ Advanced Certification Practice Exam Set 7

A security administrator must implement AES encryption throughout a company’s wireless network. Which of the following MUST be configured?

Options are :

  • TKIP
  • CCMP
  • WPA
  • 802.11n

Answer : CCMP

Which of the following will teach employees about malicious attempts from an attacker to obtain bank account information?

Options are :

  • Password complexity requirements
  • Handling PII
  • Tailgating techniques
  • Phishing techniques

Answer : Phishing techniques

User awareness training about proper disclosure of information, handling of corporate data, and security policies is important due to the popularity of which of the following?

Options are :

  • Virtual private networks
  • Social networking sites
  • Zero day exploits
  • Wireless networks

Answer : Social networking sites

BR0-002 CompTIA Network + Bridge Practice Exam Set 3

Which of the following methods of access, authentication, and authorization is the MOST secure by default?

Options are :

  • LDAP
  • Kerberos

Answer : Kerberos

Which of the following is the MOST appropriate risk mitigation strategy to use in order to identify an unauthorized administrative account?

Options are :

  • Routine audits of system logs
  • Incident management
  • Change management
  • User’s rights and permissions review

Answer : User’s rights and permissions review

Which of the following devices is typically used at the enclave boundary to inspect, block, and re-route network traffic for security purposes?

Options are :

  • Load balancers
  • Protocol analyzers
  • Firewalls
  • Spam filter

Answer : Firewalls

CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 7

IPSec has been chosen for remote access VPN connections for telecommuters. Which of the following combinations would BEST secure the connection?

Options are :

  • Transport mode, AH
  • Tunnel mode, ESP
  • Tunnel mode, AH
  • Transport mode, ESP

Answer : Tunnel mode, ESP

Which of the following prevents numerous SYN packets from being accepted by a device?

Options are :

  • Flood guards
  • Transport encryption
  • Implicit deny
  • VLAN management

Answer : Flood guards

Which of the following concepts ensures that the data is only viewable to authorized users?

Options are :

  • Biometrics
  • Confidentiality
  • Integrity
  • Availability

Answer : Confidentiality

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 13

Which of the following stops malicious traffic from affecting servers?

Options are :

  • Protocol analyzers
  • Sniffers
  • NIPS
  • NIDS

Answer : NIPS

Actively monitoring data streams in search of malicious code or behavior is an example of

Options are :

  • load balancing
  • URL filtering.
  • an Internet proxy.
  • content inspection.

Answer : content inspection.

Which of the following requires special handling and explicit policies for data retention and data distribution?

Options are :

  • Personally identifiable information
  • Zero day exploits
  • Phishing attacks
  • Personal electronic devices

Answer : Personally identifiable information

CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 8

Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?

Options are :

  • Firewall
  • IDS
  • Malware inspection
  • Spam filter

Answer : IDS

Which of the following technologies is used to verify that a file was not altered?

Options are :

  • MD5
  • AE5
  • DES
  • RC5

Answer : MD5

Which of the following systems implements a secure key distribution system that relies on hardcopy keys intended for individual sessions?

Options are :

  • One-time pads
  • Blowfish
  • PKI

Answer : One-time pads

N10-006 CompTIA Network+ Certification Practice Test Set 5

An offsite location containing the necessary hardware without data redundancy would be an example of which of the following off-site contingency plans?

Options are :

  • Cold site
  • Hot site
  • Cluster
  • Warm site

Answer : Warm site

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions