CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 1

A computer supply company is located in a building with three wireless networks. The system security team implemented a quarterly security scan and saw the following. Which of the following is this an example of? SSID State Channel Level Computer AreUs1 connected 1 70dbm Computer AreUs2 connected 5 80dbm Computer AreUs3 connected 3 75dbm Computer AreUs4 connected 6 95dbm


Options are :

  • Jamming
  • Rouge access point
  • Near field communication
  • Packet sniffing

Answer : Rouge access point

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 6

A new web server has been provisioned at a third party hosting provider for processing credit card transactions. The security administrator runs the netstat command on the server and notices that ports 80, 443, and 3389 are in a „listening? state. No other ports are open. Which of the following services should be disabled to ensure secure communications?


Options are :

  • HTTP
  • TELNET
  • RDP
  • HTTPS

Answer : HTTP

A recent audit has revealed weaknesses in the process of deploying new servers and network devices. Which of the following practices could be used to increase the security posture during deployment? (Select TWO).


Options are :

  • Disable unnecessary services
  • Deploy a honeypot
  • Change default passwords
  • Implement an application firewall

Answer : Disable unnecessary services Change default passwords

A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of a busy shopping mall. The company has experienced several laptop thefts from the cafe during peek shopping hours of the day. Corporate has asked that the IT department provide a solution to eliminate laptop theft. Which of the following would provide the IT department with the BEST solution?


Options are :

  • Install a GPS tracking device onto each laptop
  • Install security cameras within the perimeter of the cafe
  • Attach cable locks to each laptop
  • Require each customer to sign an AUP

Answer : Attach cable locks to each laptop

NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 1

An auditor's report discovered several accounts with no activity for over 60 days. The accounts were later identified as contractors? accounts who would be returning in three months and would need to resume the activities. Which of the following would mitigate and secure the auditors finding?


Options are :

  • Reset contractor accounts and inform the auditor of the update.
  • Disable unnecessary contractor accounts and inform the auditor of the update.
  • Delete contractor accounts and inform the auditor of the update.
  • Inform the auditor that the accounts belong to the contractors.

Answer : Disable unnecessary contractor accounts and inform the auditor of the update.

A system administrator has been instructed by the head of security to protect their data at-rest. Which of the following would provide the strongest protection?


Options are :

  • Biometric controls on data center entry points
  • Prohibiting removable media
  • Incorporating a full-disk encryption system
  • A host-based intrusion detection system

Answer : Incorporating a full-disk encryption system

A group policy requires users in an organization to use strong passwords that must be changed every 15 days. Joe and Ann were hired 16 days ago. When Joe logs into the network, he is prompted to change his password; when Ann logs into the network, she is not prompted to change her password. Which of the following BEST explains why Ann is not required to change her password?


Options are :

  • Ann?s user account has administrator privileges.
  • Joe?s user account was not added to the group policy.
  • Joe?s user account was inadvertently disabled and must be re-created.
  • Ann?s user account was not added to the group policy.

Answer : Ann?s user account was not added to the group policy.

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 12

An Information Systems Security Officer (ISSO) has been placed in charge of a classified peer-to-peer network that cannot connect to the Internet. The ISSO can update the antivirus definitions manually, but which of the following steps is MOST important?


Options are :

  • The signatures must have a hash value equal to what is displayed on the vendor site.
  • A full scan must be run on the network after the DAT file is installed.
  • The definition file must be updated within seven days.
  • All users must be logged off of the network prior to the installation of the definition file.

Answer : The signatures must have a hash value equal to what is displayed on the vendor site.

Which of the following is the BEST concept to maintain required but non-critical server availability?


Options are :

  • Hot site
  • SaaS site
  • Warm site
  • Cold site

Answer : Warm site

Ann has taken over as the new head of the IT department. One of her first assignments was to implement AAA in preparation for the company?s new telecommuting policy. When she takes inventory of the organizations existing network infrastructure, she makes note that it is a mix of several different vendors. Ann knows she needs a method of secure centralized access to the company?s network resources. Which of the following is the BEST service for Ann to implement?


Options are :

  • LDAP
  • TACACS+
  • RADIUS
  • SAML

Answer : RADIUS

CT0-101 Convergence+ Certification Practice Exam Set 12

Joe, a technician at the local power plant, notices that several turbines had ramp up in cycles during the week. Further investigation by the system engineering team determined that a timed.exe file had been uploaded to the system control console during a visit by international contractors. Which of the following actions should Joe recommend?


Options are :

  • Implement stronger WPA2 Wireless
  • Enable PKI for the MainFrame
  • Implement patch management
  • Create a VLAN for the SCADA

Answer : Create a VLAN for the SCADA

Several employee accounts appear to have been cracked by an attacker. Which of the following should the security administrator implement to mitigate password cracking attacks? (Select TWO).


Options are :

  • Implement monitoring of logins
  • Implement password expiration
  • Increase password length
  • Increase password complexity
  • Deploy an IDS to capture suspicious logins
  • Implement password history

Answer : Increase password length Increase password complexity

Ann, the network administrator, has learned from the helpdesk that employees are accessing the wireless network without entering their domain credentials upon connection. Once the connection is made, they cannot reach any internal resources, while wired network connections operate smoothly. Which of the following is MOST likely occurring?


Options are :

  • The company is currently experiencing an attack on their internal DNS servers.
  • The company?s WEP encryption has been compromised and WPA2 needs to be implemented instead.
  • An attacker has installed an access point nearby in an attempt to capture company information.
  • A user has plugged in a personal access point at their desk to connect to the network wirelessly.

Answer : An attacker has installed an access point nearby in an attempt to capture company information.

CompTIA A+ 220 901

Human Resources suspects an employee is accessing the employee salary database. The administrator is asked to find out who it is. Inorder to complete this task, which of the following is a security control that should be in place?


Options are :

  • Privileges should be assigned to groups rather than individuals
  • Shared accounts should not be in use
  • Time of day restrictions should be in use
  • Account lockout should be enabled

Answer : Shared accounts should not be in use

Joe analyzed the following log and determined the security team should implement which of the following as a mitigation method against further attempts? Host 192.168.1.123 [00:00:01]Successful Login: 015 192.168.1.123 : local [00:00:03]Unsuccessful Login: 022 214.34.56.006 :RDP 192.168.1.124 [00:00:04]UnSuccessful Login: 010 214.34.56.006 :RDP 192.168.1.124 [00:00:07]UnSuccessful Login: 007 214.34.56.006 :RDP 192.168.1.124 [00:00:08]UnSuccessful Login: 003 214.34.56.006 :RDP 192.168.1.124


Options are :

  • Reporting
  • Hardening
  • IDS
  • Monitor system logs

Answer : Hardening

LDAP and Kerberos are commonly used for which of the following?


Options are :

  • To utilize single sign-on capabilities
  • To sign SSL wildcard certificates for subdomains
  • To store usernames and passwords for Federated Identity
  • To perform queries on a directory service

Answer : To utilize single sign-on capabilities

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 16

The Chief Risk Officer is concerned about the new employee BYOD device policy and has requested the security department implement mobile security controls to protect corporate data in the event that a device is lost or stolen. The level of protection must not be compromised even if the communication SIM is removed from the device. Which of the following BEST meets the requirements? (Select TWO).


Options are :

  • Patch management
  • Screen-locks
  • Asset tracking
  • Device encryption
  • Geo-tagging

Answer : Screen-locks Device encryption

Which of the following technical controls helps to prevent Smartphones from connecting to a corporate network?


Options are :

  • Acceptable use policy
  • Mobile device management
  • Application white listing
  • Remote wiping

Answer : Mobile device management

Joe, a network security engineer, has visibility to network traffic through network monitoring tools. However, he?s concerned that a disgruntled employee may be targeting a server containing the company?s financial records. Which of the following security mechanism would be MOST appropriate to confirm Joe?s suspicion?


Options are :

  • NIDS
  • HIPS
  • HIDS
  • NIPS

Answer : HIDS

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 7

Prior to leaving for an extended vacation, Joe uses his mobile phone to take a picture of his family in the house living room. Joe posts the picture on a popular social media site together with the messagE. “Heading to our two weeks vacation to Italy.” Upon returning home, Joe discovers that the house was burglarized. Which of the following is the MOST likely reason the house was burglarized if nobody knew Joe?s home address?


Options are :

  • Joe has enabled the device access control feature on his mobile phone.
  • Joe?s home address can be easily found using the TRACEROUTE command.
  • The picture uploaded to the social media site was geo-tagged by the mobile phone.
  • The message posted on the social media site informs everyone the house will be empty.

Answer : The picture uploaded to the social media site was geo-tagged by the mobile phone.

The act of magnetically erasing all of the data on a disk is known as:


Options are :

  • Degaussing
  • Scrubbing
  • Wiping
  • Dissolution

Answer : Degaussing

Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol, which can utilize EAP. Which of the following would BEST fit her objective?


Options are :

  • Kerberos
  • SAML
  • CHAP
  • Diameter

Answer : Diameter

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 11

A company hired Joe, an accountant. The IT administrator will need to create a new account for Joe. The company uses groups for ease of management and administration of user accounts. Joewill need network access to all directories, folders and files within the accounting department. Which of the following configurations will meet the requirements?


Options are :

  • Create two accounts: a user account and an account with full network administration rights.
  • Create a user account and assign the user account to the accounting group.
  • Create an account with role-based access control for accounting.
  • Create a user account with password reset and notify Joe of the account creation.

Answer : Create an account with role-based access control for accounting.

Which of the following would prevent a user from installing a program on a company-owned mobile device?


Options are :

  • Remote wipe
  • White-listing
  • Access control lists
  • Geotagging

Answer : White-listing

Ann works at a small company and she is concerned that there is no oversight in the finance department; specifically, that Joe writes,signs and distributes paychecks, as well as other expenditures. Which of the following controls can she implement to address this concern?


Options are :

  • Time of day restrictions
  • Mandatory vacations
  • Least privilege
  • Separation of duties

Answer : Separation of duties

CompTIA CySA+ (CS0-001) 5 Practice Certification Exams Set 4

Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of mis-configurations or faults?


Options are :

  • Protocol security
  • VLAN
  • Port security
  • VSAN

Answer : VSAN

A way to assure data at-rest is secure even in the event of loss or theft is to use:


Options are :

  • Special permissions on the file system.
  • Access Control Lists.
  • Trusted Platform Module integration.
  • Full device encryption.

Answer : Full device encryption.

Ann, a company?s security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Ann should immediately implement which of the following?


Options are :

  • Technical controls
  • Security awareness training
  • Physical security controls
  • Acceptable Use Policy

Answer : Security awareness training

CompTIA A+ (220-1002) Test Prep, Exams and Simulations Set 3

A process in which the functionality of an application is tested without any knowledge of the internal mechanisms of the application is known as:


Options are :

  • Black box testing
  • Gray box testing
  • White box testing
  • Black hat testing

Answer : Black box testing

Joe, the systems administrator, is setting up a wireless network for his team?s laptops only and needs to prevent other employees from accessing it. Which of the following would BEST address this?


Options are :

  • Implement MAC filtering on the access point.
  • Use WPA instead of WEP encryption.
  • Disable default SSID broadcasting
  • Lower the access point?s power settings.

Answer : Implement MAC filtering on the access point.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions