CompTIA JK0-015 E2C Security+ Certification Practice Test Set 8

Which of the following is a best practice when creating groups of user and computer accounts in a directory service?


Options are :

  • Seniority at the company and access level
  • Naming conventions and technical aptitude
  • Delegation of administration and policy deployment (Correct)
  • Department and salary divisions

Answer : Delegation of administration and policy deployment

An employee with a regular user account has downloaded a software program which allowed the user to join the administrator group. Which of the following is occurring?


Options are :

  • Privilege escalation (Correct)
  • Virus
  • Buffer overflow
  • Trojan

Answer : Privilege escalation

During a change management meeting, changes within the firewall were approved. Which of the following processes should an administrator follow?


Options are :

  • Backup all current entries, perform and log all changes (Correct)
  • Log all changes being performed.
  • Save all current entries and perform changes
  • Put firewall offline to perform all changes and return it online.

Answer : Backup all current entries, perform and log all changes

Which of the following BEST describes NAC?


Options are :

  • Provides access based on ARP requests
  • Translates between DHCP requests and IP addresses
  • Provides access based on predetermined characteristics (Correct)
  • Translates between private addresses and public addresses

Answer : Provides access based on predetermined characteristics

Which of the following would an administrator MOST likely update after deploying a service pack?


Options are :

  • Patch
  • Configuration baseline (Correct)
  • Group policy
  • Hotfix

Answer : Configuration baseline

Which of the following allows two people to communicate securely without having to know each other prior to communicating?


Options are :

  • PKI (Correct)
  • AES
  • 3DES
  • Symmetric keys

Answer : PKI

Which of the following should be protected from disclosure?


Options are :

  • Certificate revocation list
  • User's private key passphrase (Correct)
  • User's public key
  • Public key infrastructure

Answer : User's private key passphrase

Which of the following is the main disadvantage of implementing a certificate revocation list?


Options are :

  • The CRL database cannot be duplicated.
  • Revocation is not instantaneous.
  • It is a single point of failure and expensive to maintain (Correct)
  • Only a certain number of certificates can be revoked

Answer : It is a single point of failure and expensive to maintain

On which of the following algorithms is PGP based?


Options are :

  • MD5
  • DES
  • WPA
  • RSA (Correct)

Answer : RSA

Which of the following desktop solutions can a user implement to detect and delete downloaded malware?


Options are :

  • Antivirus (Correct)
  • HIPS
  • HIDS
  • Desktop firewall

Answer : Antivirus

Command-and-Control is a key element of a:


Options are :

  • rootkit
  • logic bomb.
  • botnet. (Correct)
  • trojan.

Answer : botnet.

The network administrator has determined that a large number of corporate workstations on the network are connecting to an IRC server on the Internet, and these same workstations are executing DDOS attacks on remote systems. Which of the following terms BEST describes this situation?


Options are :

  • Botnet (Correct)
  • Worm
  • Spam
  • Rootkit

Answer : Botnet

Which of the following attacks can be mitigated by shredding confidential documents?


Options are :

  • Phishing
  • Hoax
  • Shoulder surfing
  • Dumpster diving (Correct)

Answer : Dumpster diving

Rule-based access control is closely aligned with which of the following?


Options are :

  • Mandatory access control (Correct)
  • Implicit deny
  • Access control lists
  • Role-based access control

Answer : Mandatory access control

Which of the following tools is used to report a wide range of security and configuration problems on a network?


Options are :

  • TACACS
  • Port scanner
  • Protocol analyzer
  • Vulnerability scanner (Correct)

Answer : Vulnerability scanner

A security administrator is worried about attackers accessing a specific server within the company's network. Which of the following would allow the security staff to identify unauthorized access to the server?


Options are :

  • Antivirus
  • Anti-spyware
  • HIDS (Correct)
  • Honeypot

Answer : HIDS

Which of the following BEST describes the function of a NIDS?


Options are :

  • Analyzing network traffic for suspicious traffic (Correct)
  • Analyzing LAN traffic for file sharing software
  • Diverting suspicious traffic in real-time
  • DIverting spyware traffic to the DMZ

Answer : Analyzing network traffic for suspicious traffic

Which of the following audit systems should be enabled in order to audit user access and be able to know who is trying to access critical systems?


Options are :

  • Password policy
  • Failed logon attempts (Correct)
  • Account expiration
  • Group policy

Answer : Failed logon attempts

Which of the following will allow a security administrator to determine potentially malicious traffic traversing the network


Options are :

  • Performance monitor
  • Task manager
  • Protocol analyzer (Correct)
  • Systems monitor

Answer : Protocol analyzer

Which of the following is used to determine who transported a hard drive during an incident response investigation?


Options are :

  • Chain of custody (Correct)
  • Damage and loss control
  • Disclosure guidelines
  • Forensic policy

Answer : Chain of custody

The MOST expensive and effective alternate site that provides the HIGHEST level of availability, is called a:


Options are :

  • cold site.
  • warm site.
  • primary site.
  • hot site. (Correct)

Answer : hot site.

Which of the following would be used to gain access to a data center where the administrator would have to use multiple authentication factors?


Options are :

  • Enter two different passwords
  • Fingerprint scan and password (Correct)
  • Fingerprint and retina scan
  • ID badge and smartcard

Answer : Fingerprint scan and password

The network administrator has been asked to turn off access to the command prompt for some users. Which of the following is the BEST choice to complete this request?


Options are :

  • Deploy a hotfix.
  • Deploy patches.
  • Deploy service packs.
  • Deploy a group policy (Correct)

Answer : Deploy a group policy

Which of the following ports is susceptible to DNS poisoning?


Options are :

  • 8080
  • 53 (Correct)
  • 80
  • 23

Answer : 53

The manager has tasked an administrator to test the security of the network. The manager wants to know if there are any issues that need to be addressed, but the manager is concerned about affecting normal operations. Which of the following should be used to test the network?


Options are :

  • Use a vulnerability scanner (Correct)
  • Use a protocol analyzer
  • Launch a DDoD attack in the network and see what occurs.
  • Read the log files on each system on the network.

Answer : Use a vulnerability scanner

The IT department has been having issues lately with vulnerabilities occurring on the network due to outdated software on new computers that are deployed. Which of the following would be the BEST way for the administrator to address this issue?


Options are :

  • Build security templates for the OS
  • Implement group policies
  • Establish configuration baselines for the images (Correct)
  • Ensure that all patches are installed by employees

Answer : Establish configuration baselines for the images

Which of the following devices would be used to gain access to a secure network without affecting network connectivity?


Options are :

  • Fiber-optic splicer
  • Router
  • Firewall
  • Vampire tap (Correct)

Answer : Vampire tap

The administrator needs to set permissions for the new print server for a company comprised of 320 people in 18 departments. Each department has its own set of printers. Which of the following options is the BEST way to do this?


Options are :

  • Place all the people into distribution groups. Assign printer access by access group.
  • Place all the people into departmental groups. Assign printer access by matching individuals to printer groups.
  • Place all the people into departmental groups. Assign access to all printers for each group.
  • Place all the people into departmental groups. Assign printer access by matching group to department. (Correct)

Answer : Place all the people into departmental groups. Assign printer access by matching group to department.

Which of the following is performed when conducting a penetration test?


Options are :

  • Documentation of network security settings, policy gaps and user errors.
  • Demonstrations of security vulnerabilities and flaws in policy implementation. (Correct)
  • Documentation of security vulnerabilities and policy gaps.
  • Demonstrations of network capabilities and resiliency.

Answer : Demonstrations of security vulnerabilities and flaws in policy implementation.

A user is recording a file on disk. Which of the following will allow a user to verify that the file is the original?


Options are :

  • MD5 (Correct)
  • RSA
  • NTFS
  • 3DES

Answer : MD5

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions