CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 11

During which of the following phases of the Incident Response process should a security administrator define and implement general defense against malware?


Options are :

  • Eradication
  • Lessons Learned
  • Identification
  • Preparation

Answer : Preparation

CompTIA JK0-022 E2C Security+ Threats & Vulnerabilities Exam Set 5

A security team has identified that the wireless signal is broadcasting into the parking lot. To reduce the risk of an attack against the wireless network from the parking lot, which of the following controls should be used? (Select TWO).


Options are :

  • Power levels
  • Disable the SSID
  • Antenna placement
  • Use WEP
  • Interference
  • Single sign on

Answer : Power levels Antenna placement

A company?s legacy server requires administration using Telnet. Which of the following protocols could be used to secure communication by offering encryption at a lower OSI layer? (Select TWO).


Options are :

  • IPSec
  • SFTP
  • SSH
  • IPv6

Answer : IPSec IPv6

Which of the following describes the purpose of an MOU?


Options are :

  • Define responsibilities of each party
  • Define data backup process
  • Define interoperability requirements
  • Define onboard/offboard procedure

Answer : Define responsibilities of each party

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 13

A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the vendors using older technology report that they are unable to access the wireless network after entering the correct network information. Which of the following is the MOST likely reason for this issue?


Options are :

  • The MAC filtering is disabled on the access point.
  • The SSID broadcast is disabled.
  • The company is not using strong enough encryption.
  • The company is using the wrong antenna type

Answer : The SSID broadcast is disabled.

Which of the following types of application attacks would be used to identify malware causing security breaches that have NOT yet been identified by any trusted sources?


Options are :

  • LDAP injection
  • Directory traversal
  • Zero-day
  • XML injection

Answer : Zero-day

A company determines a need for additional protection from rogue devices plugging into physical ports around the building. Which of the following provides the highest degree of protection from unauthorized wired network access?


Options are :

  • 802.1x
  • Flood guards
  • Intrusion Prevention Systems
  • MAC filtering

Answer : 802.1x

CompTIA Security+ Certification (SY0-501): Sample Tests

Users report that they are unable to access network printing services. The security technician checks the router access list and sees that web, email, and secure shell are allowed. Which of the following is blocking network printing?


Options are :

  • Implicit deny
  • Flood guards
  • Loop protection
  • Port security

Answer : Implicit deny

A technician is unable to manage a remote server. Which of the following ports should be opened on the firewall for remote server management? (Select TWO).


Options are :

  • 135
  • 3389
  • 143
  • 443
  • 22
  • 137

Answer : 3389 22

The company is not using strong enough encryption.


Options are :

  • Implement privacy policies
  • Environmental monitoring
  • Enforce time of day restrictions
  • Enforce mandatory vacations

Answer : Enforce mandatory vacations

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 8

A security administrator wishes to increase the security of the wireless network. Which of the following BEST addresses this concern?


Options are :

  • None
  • Set all nearby access points to operate on the same channel.
  • Change the encryption from TKIP-based to CCMP-based.
  • Enable all access points to broadcast their SSIDs.
  • Configure the access point to use WEP instead of WPA2.

Answer : Change the encryption from TKIP-based to CCMP-based.

Environmental control measures include which of the following?


Options are :

  • Lighting
  • Motion detection
  • EMI shielding
  • Access list

Answer : EMI shielding

Which of the following would allow the organization to divide a Class C IP address range into several ranges?


Options are :

  • DMZ
  • Subnetting
  • Virtual LANs
  • NAT

Answer : Subnetting

Mock : CompTIA A+ Certification 220-902

Company XYZ recently salvaged company laptops and removed all hard drives, but the Chief Information Officer (CIO) is concerned about disclosure of confidential information. Which of the following is the MOST secure method to dispose of these hard drives?


Options are :

  • Degaussing
  • Physical Destruction
  • Lock up hard drives in a secure safe
  • Wipe

Answer : Physical Destruction

The Chief Technical Officer (CTO) is worried about an increased amount of malware detected on end user?s workstations. Which of the following technologies should be recommended to detect such anomalies?


Options are :

  • Web application firewall
  • Host-based IDS
  • NIDS
  • Web content filter

Answer : Host-based IDS

Which of the following would the security engineer set as the subnet mask for the servers below to utilize host addresses on separate broadcast domains? Server 1: 192.168.100.6 Server 2: 192.168.100.9 Server 3: 192.169.100.20


Options are :

  • /29
  • /27
  • /28
  • /24

Answer : /29

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 18

Which of the following is a security benefit of providing additional HVAC capacity or increased tonnage in a datacenter?


Options are :

  • Longer MTBF of hardware due to lower operating temperatures
  • Higher data integrity due to more efficient SSD cooling
  • Increased availability of network services due to higher throughput
  • Longer UPS run time due to increased airflow

Answer : Longer MTBF of hardware due to lower operating temperatures

Which of the following is true about the recovery agent?


Options are :

  • It can recover both the private and public key of federated users.
  • It can recover and provide users with their lost or private key.
  • It can decrypt messages of users who lost their private key.
  • It can recover and provide users with their lost public key.

Answer : It can decrypt messages of users who lost their private key.

Fizzing is a security assessment technique that allows testers to analyze the behaviour of software applications under which of the following conditions?


Options are :

  • Parameterized input
  • Unexpected input
  • Invalid output
  • Valid output

Answer : Unexpected input

LX0-104 CompTIA Linux + Powered by LPI Practice Exam Set 3

Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network. Which of the following types of technologies will BEST address this scenario?


Options are :

  • Signature IDS
  • Anomaly Based IDS
  • Proxy Firewall
  • Application Firewall

Answer : Anomaly Based IDS

The network administrator has been tasked to rebuild a compromised web server. The administrator is to remove the malware and install all the necessary updates and patches. This represents which of the following stages of the Incident Handling Response?


Options are :

  • Eradication
  • Lessons Learned
  • Reconstitution
  • Plan of action

Answer : Eradication

The system administrator has deployed updated security controls for the network to limit risk of attack. The security manager is concerned that controls continue to function as intended to maintain appropriate security posture. Which of the following risk mitigation strategies is MOST important to the security manager?


Options are :

  • Policy enforcement
  • Routine audits
  • User permissions
  • Change management

Answer : Routine audits

CompTIA HT0-201 DHTI+ Certification Practice Exam Set 1

Which of the following components of an all-in-one security appliance would MOST likely be configured in order to restrict access to peer-to-peer file sharing websites?


Options are :

  • Malware inspection
  • URL filter
  • Content inspection
  • Spam filter

Answer : URL filter

An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to integrate the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal?


Options are :

  • Single sign on
  • Virtual Private Network
  • Role-based management
  • Unified Threat Management

Answer : Unified Threat Management

A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to unauthorized file transfers, and wants to configure a firewall to block all TFTP traffic. Which of the following would accomplish this task?


Options are :

  • Deny UDP port 68
  • Deny TCP port 69
  • Deny TCP port 68
  • Deny UDP port 69

Answer : Deny UDP port 69

CompTIA JK0-801 A+ Certification Practical Exam Set 6

The Chief Technical Officer (CTO) has tasked The Computer Emergency Response Team (CERT) to develop and update all Internal Operating Procedures and Standard Operating Procedures documentation in order to successfully respond to future incidents. Which of the following stages of the Incident Handling process is the team working on?


Options are :

  • Preparation
  • Lessons Learned
  • . Eradication
  • Recovery

Answer : Preparation

When designing a new network infrastructure, a security administrator requests that the intranet web server be placed in an isolated area of the network for security purposes. Which of the following design elements would be implemented to comply with the security administrator?s request?


Options are :

  • Virtualization
  • Sandboxing
  • Cloud services
  • DMZ

Answer : DMZ

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions