CompTIA JK0-015 E2C Security+ Certification Practice Test Set 7

A recipient's public key can be used by a data sender to ensure which of the following?


Options are :

  • Sender anonymity
  • Data confidentiality (Correct)
  • Sender authentication
  • Data availability

Answer : Data confidentiality

Which of the following is a required component for deploying Kerberos?


Options are :

  • Certificate authority
  • Remote access server
  • Extensible authentication protocol
  • Ticket granting server (Correct)

Answer : Ticket granting server

Which of the following security tools can view the SSIDs of wireless networks even when they have SSID broadcasting disabled?


Options are :

  • Netstumbler
  • Kismet
  • RADIUS
  • NMAP (Correct)

Answer : NMAP

The physical location of rogue access points can be discovered by using which of the following?


Options are :

  • Creating honeypots
  • War driving (Correct)
  • IPS
  • Remote monitoring

Answer : War driving

The newly hired security administrator for a company suspects that the previous security administrator has maliciously left code to corrupt the logging systems in 30 days. Which of the following is suspected to be in the system?


Options are :

  • Virus
  • Spyware
  • Trojan
  • Logic bomb (Correct)

Answer : Logic bomb

Which of the following is MOST likely to be used to transfer malicious code to a corporate network by introducing viruses during manufacturing?


Options are :

  • USB drives (Correct)
  • BIOS chips
  • Cell phones
  • P2P software

Answer : USB drives

Which of the following is a mitigation technique that addresses signal emanation?


Options are :

  • Placing shielding on one side of a wireless router (Correct)
  • Installing a WIDS in addition to the wireless router
  • Turning off the SSID broadcast on the wireless router
  • Configuring WPA instead of WEP on the wireless router

Answer : Placing shielding on one side of a wireless router

Which of the following access control methods prevents a user from accessing network resources after the end of the users typical shift?


Options are :

  • Group policy
  • Password policy
  • Acceptable use policy
  • Time of day restrictions (Correct)

Answer : Time of day restrictions

Which of the following can restrict a computer from receiving network traffic?


Options are :

  • Software firewall (Correct)
  • HIDS
  • NIDS
  • Antivirus

Answer : Software firewall

Which of the following is the BEST solution for an administrator to implement in order to learn more about the zeroday exploit attacks on the internal network?


Options are :

  • An IDS
  • A HIDS
  • A Honeypot (Correct)
  • A stateful firewall

Answer : A Honeypot

Which of the following security threats MOST frequently uses IRC to communicate with a remote host?


Options are :

  • Phishing
  • Spam
  • Botnets (Correct)
  • Worm

Answer : Botnets

Assigning access on a need-to-knows basis is a best practice in which of the following controls?


Options are :

  • Patch management
  • Vulnerability assessment
  • Risk assessment
  • Account management (Correct)

Answer : Account management

Which of the following practices is MOST relevant to protecting against operating system security flaws?


Options are :

  • Network intrusion detection
  • FNetwork intrusion detection
  • Patch management (Correct)
  • Antivirus selection

Answer : Patch management

Which of the following is MOST commonly implemented to transport network device logs to a logging server?


Options are :

  • SMTP
  • SHTTP
  • SYSLOG (Correct)
  • SOCKS

Answer : SYSLOG

A company is having a problem with users setting up rogue access points. Which of the following solutions would be the BEST for the administrator to implement?


Options are :

  • Implement least privilege access
  • MAC address filtering (Correct)
  • Password policy hardening
  • Stop SSID broadcasting

Answer : MAC address filtering

Employees are unable to open internal company documents as they all appear to be encrypted. The company CIO has received an email asking for $10,000 in exchange for the documents decryption key. Which of the following BEST describes this type of attack?


Options are :

  • Rootkit attack
  • Ransomware (Correct)
  • Trojan attack
  • Adware

Answer : Ransomware

A user reports that after searching the Internet for office supplies and visiting one of the search engine results websites, they began receiving unsolicited pop-ups on subsequent website visits. Which of the following is the MOST likely cause of the unsolicited pop-ups?


Options are :

  • Trojan
  • Spam
  • Virus
  • Adware (Correct)

Answer : Adware

Which of the following would protect an employees network traffic on a non-company owned network?


Options are :

  • 802.1x
  • VPN (Correct)
  • Antivirus
  • RADIUS

Answer : VPN

Which of the following best practices should be applied to print resources to enforce existing information assurance controls?


Options are :

  • Restrict group membership to users who do not print often.
  • Ensure that all user groups have permission to all printers.
  • Remove unnecessary users from groups with permissions to the resources. (Correct)
  • Set the printer to standby mode after hours.

Answer : Remove unnecessary users from groups with permissions to the resources.

System resource monitors and baselines on web servers should be used by security team members to detect:


Options are :

  • new server policies.
  • the need for increased bandwidth availability.
  • expired accounts in use.
  • denial-of-service conditions. (Correct)

Answer : denial-of-service conditions.

Which of the following relies on prime numbers to generate keys?


Options are :

  • Elliptic curve
  • AES
  • RSA (Correct)
  • IPSec

Answer : RSA

Which of the following is the primary difference between role-based access control and rule-based access control?


Options are :

  • Both are based on local legal regulations but role based provides greater security.
  • Both are based on job title but rule based provides greater user flexibility.
  • One is based on job function and the other on a set of approved instructions. (Correct)
  • One is based on identity and the other on authentication.

Answer : One is based on job function and the other on a set of approved instructions.

In order to help maintain system security, employees are only given rights to perform their current job function. Which of the following BEST describes this practice?


Options are :

  • Least privilege (Correct)
  • Job rotation
  • Implicit deny
  • Separation of duties

Answer : Least privilege

Which of the following is MOST closely associated with email?


Options are :

  • IPSec
  • SSH
  • TLS
  • S/MIME (Correct)

Answer : S/MIME

During a data exfiltration penetration test, which of the following is the NEXT step after gaining access to a system?


Options are :

  • Attack weak passwords
  • Privilege escalation (Correct)
  • Use default accounts
  • DoS

Answer : Privilege escalation

A system administrator wants to verify that the corporate users are following the security policy on password complexity requirements. Which of the following could be used to verify the passwords?


Options are :

  • Password cracking (Correct)
  • Password hashing
  • Password hardening
  • Password enumeration

Answer : Password cracking

Which of the following BEST characterizes a DMZ?


Options are :

  • A trusted network that is encrypted end-to-end.
  • A network that resides between trusted and non-trusted networks. (Correct)
  • A connection between two trusted networks.
  • A trusted segment to a VPN concentrator.

Answer : A network that resides between trusted and non-trusted networks.

A user reports a problem with resetting a password on the company website. The help desk determined the user was redirected to a fraudulent website. Which of the following BEST describes attack type?


Options are :

  • Logic bomb
  • XSS (Correct)
  • Spyware
  • Worm

Answer : XSS

After deploying a new IDS, an administrator notices a large amount of notifications coming from a filter inspecting port 445. Which of the following can BEST help the administrator in determining if the notifications are false positives?


Options are :

  • The router tables
  • IDS performance monitor
  • Protocol analyzer (Correct)
  • Firewall log

Answer : Protocol analyzer

WPA2-Enterprise can use which of the following to authenticate a user?


Options are :

  • RRAS
  • RADIUS (Correct)
  • RSA
  • TKIP

Answer : RADIUS

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions