CompTIA JK0-015 E2C Security+ Certification Practice Test Set 6

Which of the following is mitigated by implementing proper data validation?

Options are :

  • SMTP open relays
  • DNS poisoning
  • Rootkits
  • Cross-site scripting (Correct)

Answer : Cross-site scripting

Which of the following BEST secures ingress and egress points in a data center?

Options are :

  • Proximity cards (Correct)
  • Log book
  • Escorts
  • ID badges

Answer : Proximity cards

A network administrator is alerted to an incident on a file server. The alerting application is a file integrity checker. Which of the following is a possible source of this HIDS alert?

Options are :

  • Teardrop attack
  • Rootkit (Correct)
  • DDOS
  • ARP poisoning

Answer : Rootkit

PGP is a cryptosystem based on which of the following encryption method?

Options are :

  • SSL
  • Asymmetric (Correct)
  • Symmetric
  • Certificate authority

Answer : Asymmetric

Which of the following is the BEST way for an attacker to conceal their identity?

Options are :

  • Disable logging (Correct)
  • Deleting the cookies
  • Increase the max size of the log
  • Shoulder surfing

Answer : Disable logging

Which of the following is the MOST common way to allow a security administrator to securely administer remote *NIX based systems?

Options are :

  • SSH (Correct)
  • PPTP
  • IPSec

Answer : SSH

Virtualization technology can be implemented to positively affect which of the following security concepts?

Options are :

  • Confidentiality
  • Availability (Correct)
  • Non-repudiation
  • Integrity

Answer : Availability

After disabling SSID broadcast for all wireless routers on the network, the administrator noticed that the Same unauthorized users were still accessing the network. Which of the following did the administrator fail to do?

Options are :

  • Disallow 802.11a traffic on the network
  • Change the SSID. (Correct)
  • Re-enable the SSID.
  • Enable ARP cache spoofing protection.

Answer : Change the SSID.

Which of the following describes bringing risk to an acceptable level?

Options are :

  • Leveraging positive risk
  • Avoiding negative risk
  • Risk mitigation (Correct)
  • Risk avoidance

Answer : Risk mitigation

Which of the following security tools can be used for vulnerability scanning?

Options are :

  • Milw0rm
  • L0phtcrack
  • Nessus (Correct)

Answer : Nessus

When managing user access to files and system resources with groups, users should be placed into groups based on which of the following?

Options are :

  • MAC, RBAC, and IP address
  • Concept of implicit deny, printer location, and biometrics
  • Concept of least privilege, required access, and security role (Correct)
  • Job rotation, server location, and MAC

Answer : Concept of least privilege, required access, and security role

Which of the following authentication models is the MOST vulnerable to password crackers?

Options are :

  • Two factor
  • Physical tokens
  • Single factor (Correct)
  • Three factor

Answer : Single factor

Most mission impacting vulnerabilities in a formal risk assessment should be:

Options are :

  • avoided
  • accepted
  • mitigated (Correct)
  • ignored

Answer : mitigated

Which of the following is the BEST mitigation against DoS attacks?

Options are :

  • Distributed power sources, NAC, and VLANs (Correct)
  • Two-factor server authentication, NIDS, and VPNs
  • Distributed, redundant datacenters with IPS
  • Redundant ISPs, power sources, and NAT

Answer : Distributed power sources, NAC, and VLANs

Which of the following should the network administrator use to remotely check if a workstation is running a P2P application?

Options are :

  • Ping sweeper
  • Port scanner (Correct)
  • Network mapper
  • ARP scanner

Answer : Port scanner

The technician just finished bringing up a new server in a live environment. Which of the following should the technician perform NEXT?

Options are :

  • Install OS patches (Correct)
  • Install antivirus software
  • Update group policies
  • Performance baseline

Answer : Install OS patches

A user reports that their system is slow and reboots on its own. The technician is unable to remotely control the computer and realizes that they no longer have administrative rights to that workstation. Which of the following is MOST likely the cause?

Options are :

  • Spam
  • Adware
  • Rootkit (Correct)
  • DDoS

Answer : Rootkit

Integrity is BEST provided by which of the following technologies?

Options are :

  • Digital signatures (Correct)
  • Symmetric key cryptography
  • Asymmetric key cryptography
  • Whole disk encryption

Answer : Digital signatures

Which of the following SSH configurations mitigate brute-force login attacks? (Select THREE).

Options are :

  • Enabling SSH version 2
  • Enforcing use of cryptographic keys (Correct)
  • Changing the default service port
  • Disabling default accounts (Correct)
  • Filtering based upon source address
  • Limiting failed logon attempts (Correct)

Answer : Enforcing use of cryptographic keys Disabling default accounts Limiting failed logon attempts

Limiting access to a file resource to only the creator by default, is an example of applying which of the following security concepts?

Options are :

  • Behavior-based security
  • Role-based access control
  • Logical tokens
  • Least privilege (Correct)

Answer : Least privilege

Multiple machines are detected connecting to a specific web server during non-business hours and receiving instructions to execute a DNS attack. Which of the following would be responsible?

Options are :

  • Adware
  • Logic Bomb
  • Botnet (Correct)
  • Virus

Answer : Botnet

Which of the following is an email attack targeted at a specific individual to trick the individual into revealing personal information?

Options are :

  • Hoax
  • Pharming
  • Phishing
  • Spear phishing (Correct)

Answer : Spear phishing

Which of the following should be implemented to mitigate the security threat of adware?

Options are :

  • Subnetting
  • Anti-spam
  • Antivirus
  • Pop-up blockers (Correct)

Answer : Pop-up blockers

Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?

Options are :

  • Remove single points of failure
  • Risk management
  • Succession planning
  • Business impact analysis (Correct)

Answer : Business impact analysis

Which of the following security measures can be used with 802.1x?

Options are :

  • Network address translation
  • Network access control (Correct)
  • IPSec VPNs
  • Internet content filter

Answer : Network access control

Which of the following are reasons why a key may be revoked? (Select TWO).

Options are :

  • Lost password
  • CA compromise (Correct)
  • Public key compromise
  • Lost trust
  • Key compromise (Correct)

Answer : CA compromise Key compromise

Wireless access points with SSID broadcast make it easier to do which of the following?

Options are :

  • Implement encryption
  • Physically tap the network
  • War driving (Correct)
  • Decrease wireless coverage

Answer : War driving

A recent risk assessment has identified vulnerabilities on a production server. The technician realizes it was recently re-imaged after a component failed on it. Which of the following is the FIRST item to assess when attempting to mitigate the risk?

Options are :

  • if all current service packs and hotfixes were re-applied (Correct)
  • If the firewall ruleset does not allow incoming traffic to the vulnerable port
  • If all device drivers were updated
  • if the spam filters have been properly applied

Answer : if all current service packs and hotfixes were re-applied

The security policy at a company clearly specifies that server administrators cannot have access to log servers or permissions to review log files. These rights are granted only to security administrators. This policy is an example of which of the following industry best practices?

Options are :

  • Job rotation
  • Implicit deny
  • Privilege escalation
  • Separation of duties (Correct)

Answer : Separation of duties

Which of the following is the primary location where global policies are implemented in an organization?

Options are :

  • Physical memory
  • Domain (Correct)
  • Security group
  • User documentation

Answer : Domain

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions