CompTIA JK0-022 E2C Security+ Compliance & Operational Exam Set 2

A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?


Options are :

  • Availability
  • Integrity
  • Confidentiality
  • Succession planning

Answer : Availability

CompTIA JK0-019 E2C Network Media & Topologies Practice Exam Set 4

A small business needs to incorporate fault tolerance into their infrastructure to increase data availability. Which of the following options would be the BEST solution at a minimal cost?


Options are :

  • Mirrored server
  • Clustering
  • Tape backup
  • RAID

Answer : RAID

After an assessment, auditors recommended that an application hosting company should contract with additional data providers for redundant high speed Internet connections. Which of the following is MOST likely the reason for this recommendation? (Select TWO).


Options are :

  • To allow load balancing for cloud support
  • To improve intranet communication speeds
  • To eliminate a single point of failure
  • To allow for business continuity if one provider goes out of business
  • To allow for a hot site in case of disaster

Answer : To eliminate a single point of failure To allow for business continuity if one provider goes out of business

Which of the following risk concepts requires an organization to determine the number of failures per year?


Options are :

  • SLE
  • Quantitative analysis
  • ALE
  • MTBF

Answer : ALE

220-902 CompTIA A+ Certification Practice Exam Set 4

Which of the following risks could IT management be mitigating by removing an all-inone device?


Options are :

  • Input validation
  • Continuity of operations
  • Single sign on
  • Single point of failure

Answer : Single point of failure

A network administrator has purchased two devices that will act as failovers for each other. Which of the following concepts does this BEST illustrate?


Options are :

  • Integrity
  • Confidentiality
  • Authentication
  • Availability

Answer : Availability

Which of the following concepts defines the requirement for data availability?


Options are :

  • Authentication to RADIUS
  • Disaster recovery planning
  • Encryption of email messages
  • Non-repudiation of email messages

Answer : Disaster recovery planning

CompTIA SY0-401 Security Certification Practice Exam Set 7

Upper management decides which risk to mitigate based on cost. This is an example of:


Options are :

  • Risk management framework
  • Business impact analysis
  • Qualitative risk assessment
  • Quantitative risk assessment

Answer : Quantitative risk assessment

Joe, the system administrator, is performing an overnight system refresh of hundreds of user computers. The refresh has a strict timeframe and must have zero downtime during business hours. Which of the following should Joe take into consideration?


Options are :

  • A plan that skips every other replaced computer to limit the area of affected users.
  • An offsite contingency server farm that can act as a warm site should any issues appear.
  • A back-out strategy planned out anticipating any unforeseen problems that may arise.
  • A disk-based image of every computer as they are being replaced.

Answer : A back-out strategy planned out anticipating any unforeseen problems that may arise.

Which of the following concepts allows an organization to group large numbers of servers together in order to deliver a common service?


Options are :

  • Backup Redundancy
  • Clustering
  • RAID
  • Cold site

Answer : Clustering

CompTIA Security+ Certification (SY0-501): Practice Tests

Ann is starting a disaster recovery program. She has gathered specifics and team members for a meeting on site. Which of the following types of tests is this?


Options are :

  • Structured walkthrough
  • Full Interruption test
  • Checklist test
  • Tabletop exercise

Answer : Structured walkthrough

In the case of a major outage or business interruption, the security office has documented the expected loss of earnings, potential fines and potential consequence to customer service. Which of the following would include the MOST detail on these objectives?


Options are :

  • Business Impact Analysis
  • Disaster Recovery Plan
  • IT Contingency Plan
  • Continuity of Operations

Answer : Business Impact Analysis

The Chief Information Officer (CIO) wants to implement a redundant server location to which the production server images can be moved within 48 hours and services can be quickly restored, in case of a catastrophic failure of the primary datacenter’s HVAC. Which of the following can be implemented?


Options are :

  • Warm site
  • Hot site
  • Load balancing
  • Cold site

Answer : Warm site

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 10

Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?


Options are :

  • Continuity of operations
  • Business continuity planning
  • Business impact analysis
  • Business impact analysis

Answer : Business impact analysis

Which of the following utilities can be used in Linux to view a list of users’ failed authentication attempts?


Options are :

  • badlog
  • faillog
  • wronglog
  • killlog

Answer : faillog

Which of the following provides the BEST application availability and is easily expanded as demand grows?


Options are :

  • Server virtualization
  • Load balancing
  • RAID 6
  • Active-Passive Cluster

Answer : Load balancing

220-702 CompTIA A+ Practical Application Certification Exam Set 4

Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the downtime in the event of a disaster, but does not have the budget approval to implement or maintain an offsite location that ensures 99.99% availability. Which of the following would be Pete’s BEST option?


Options are :

  • Use hardware already at an offsite location and configure it to be quickly utilized.
  • Retain data back-ups on the main campus and establish redundant servers in a virtual environment.
  • Move the data back-ups to the offsite location, but retain the hardware on the main campus for redundancy.
  • Move the servers and data to another part of the company’s main campus from the server room.

Answer : Use hardware already at an offsite location and configure it to be quickly utilized.

Which of the following is being tested when a company’s payroll server is powered off for eight hours?


Options are :

  • Business impact document
  • Continuity of operations plan
  • Succession plan
  • Risk assessment plan

Answer : Continuity of operations plan

Which of the following is the MOST specific plan for various problems that can arise within a system?


Options are :

  • Continuity of Operation Plan
  • Business Continuity Plan
  • IT Contingency Plan
  • Disaster Recovery Plan

Answer : IT Contingency Plan

CT0-101 Convergence+ Certification Practice Exam Set 3

Pete, the Chief Executive Officer (CEO) of a company, has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?


Options are :

  • Separation of duty
  • Disaster recovery
  • Succession planning
  • Removing single loss expectancy

Answer : Succession planning

The security manager received a report that an employee was involved in illegal activity and has saved data to a workstation’s hard drive. During the investigation, local law enforcement’s criminal division confiscates the hard drive as evidence. Which of the following forensic procedures is involved?


Options are :

  • System image
  • Order of volatility
  • Chain of custody
  • Take hashes

Answer : Chain of custody

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 1

Which of the following policies is implemented in order to minimize data loss or theft?


Options are :

  • PII handling
  • Chain of custody
  • Zero day exploits
  • Password policy

Answer : PII handling

The security officer is preparing a read-only USB stick with a document of important personal phone numbers, vendor contacts, an MD5 program, and other tools to provide to employees. At which of the following points in an incident should the officer instruct employees to use this information?


Options are :

  • Damage and Loss Control
  • Contingency Planning
  • First Responder
  • Business Impact Analysis

Answer : First Responder

Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?


Options are :

  • Restoration and recovery strategies
  • Deterrent strategies
  • Containment strategies
  • Detection strategies

Answer : Containment strategies

Mock Test : CompTIA CySA+ (CS0-001)

Several employees have been printing files that include personally identifiable information of customers. Auditors have raised concerns about the destruction of these hard copies after they are created, and management has decided the best way to address this concern is by preventing these files from being printed. Which of the following would be the BEST control to implement?


Options are :

  • Data loss prevention
  • File encryption
  • Clean desk policies
  • Printer hardening

Answer : Data loss prevention

In the initial stages of an incident response, Matt, the security administrator, was provided the hard drives in question from the incident manager. Which of the following incident response procedures would he need to perform in order to begin the analysis? (Select TWO)


Options are :

  • Take hashes
  • Begin the chain of custody paperwork
  • Capture the system image
  • Take screen shots
  • Decompile suspicious files

Answer : Take hashes Capture the system image

A forensic analyst is reviewing electronic evidence after a robbery. Security cameras installed at the site were facing the wrong direction to capture the incident. The analyst ensures the cameras are turned to face the proper direction. Which of the following types of controls is being used?


Options are :

  • Corrective
  • Preventive
  • Deterrent
  • Detective

Answer : Corrective

JK0-802 CompTIA A+ Certification Exam Set 8

Which of the following concepts is a term that directly relates to customer privacy considerations?


Options are :

  • Information classification
  • Data handling policies
  • Personally identifiable information
  • Clean desk policies

Answer : Personally identifiable information

Which of the following is a best practice when a mistake is made during a forensics examination?


Options are :

  • The examiner should document the mistake and workaround the problem.
  • The examiner should verify the tools before, during, and after an examination.
  • The examiner should disclose the mistake and assess another area of the disc.
  • The examiner should attempt to hide the mistake during cross-examination.

Answer : The examiner should document the mistake and workaround the problem.

Used in conjunction, which of the following are PII? (Select TWO).


Options are :

  • Marital status
  • Full name
  • Birthday
  • Pet’s name
  • Favorite movie

Answer : Full name Birthday

220-802 CompTIA A+ Certification Practice Exam Set 11

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions