CompTIA JK0-018 Security+ E2C Certification Practice Exam Set 4

Which of the following is used by Matt, a security administrator, to lower the risks associated with electrostatic discharge, corrosion, and thermal breakdown?


Options are :

  • Temperature and humidity controls
  • Fire suppression and EMI shielding
  • Hot and cold aisles
  • Routine audits

Answer : Temperature and humidity controls

An organization is recovering data following a datacenter outage and determines that backup copies of files containing personal information were stored in an unsecure location, because the sensitivity was unknown. Which of the following activities should occur to prevent this in the future?


Options are :

  • Data classification
  • Business continuity planning
  • Quantitative assessment
  • Qualitative assessment

Answer : Data classification

Questions & Answers : CompTIA Network+ (N10-007)

Sara, a security administrator, is noticing a slow down in the wireless network response. Saralaunches a wireless sniffer and sees a large number of ARP packets being sent to the AP. Which of the following type of attacks is underway?


Options are :

  • IV attack
  • Interference
  • Packet sniffing
  • Blue jacking

Answer : IV attack

Jane, an IT administrator, is implementing security controls on a Microsoft Windows based kiosk used at a bank branch. This kiosk is used by the public for Internet banking. Which of the following controls will BEST protect the kiosk from general public users making system changes?


Options are :

  • Group policy implementation
  • Warning banners
  • Command shell restrictions
  • Host based firewall

Answer : Group policy implementation

Power and data cables from the network center travel through the building?s boiler room. Which of the following should be used to prevent data emanation?


Options are :

  • Video monitoring
  • Plenum CAT6 UTP
  • EMI shielding
  • Fire suppression

Answer : EMI shielding

FTP/S uses which of the following TCP ports by default?


Options are :

  • 20 and 21
  • 443 and 22
  • 139 and 445
  • 989 and 990

Answer : 989 and 990

Which of the following protocols would be implemented to secure file transfers using SSL?


Options are :

  • FTPS
  • SFTP
  • SCP
  • TFTP

Answer : FTPS

A third party application has the ability to maintain its own user accounts or it may use single sign-on. To use single sign-on, the application is requesting the following information: OU=Users, DC=Domain, DC=COM. This application is requesting which of the following authentication services?


Options are :

  • LDAP
  • RADIUS
  • TACACS+
  • Kerberos

Answer : LDAP

Which of the following techniques describes the use of application isolation during execution to prevent system compromise if the application is compromised?


Options are :

  • Least privilege
  • Sandboxing
  • Application hardening
  • Black box

Answer : Sandboxing

Which of the following must a security administrator implement to isolate public facing servers from both the corporate network and the Internet?


Options are :

  • NAC
  • NAT
  • IPSec
  • DMZ

Answer : DMZ

A human resources employee receives an email from a family member stating there is a new virus going around. In order to remove the virus, a user must delete the Boot.ini file from the system immediately. This is an example of which of the following?


Options are :

  • Phishing
  • Hoax
  • Spam
  • Whaling

Answer : Hoax

Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot be sanitized?


Options are :

  • Patch management
  • Full disk encryption
  • Database encryption
  • Virtualization

Answer : Full disk encryption

Which of the following provides the LEAST availability?


Options are :

  • RAID 5
  • RAID 0
Point our Mistakes and Post Your Suggestions