CompTIA JK0-022 E2C Security+ Compliance & Operational Exam Set 7

A network administrator has purchased two devices that will act as failovers for each other. Which of the following concepts does this BEST illustrate?


Options are :

  • Authentication
  • Availability (Correct)
  • Confidentiality
  • Integrity

Answer : Availability

SY0-401 CompTIA Security+ Certification Practice Exam Set 1

Establishing a published chart of roles, responsibilities, and chain of command to be used during a disaster is an example of which of the following?


Options are :

  • Succession planning (Correct)
  • Business continuity testing
  • Fault tolerance
  • Recovery point objectives

Answer : Succession planning

Which of the following is the MOST specific plan for various problems that can arise within a system?


Options are :

  • IT Contingency Plan (Correct)
  • Disaster Recovery Plan
  • Business Continuity Plan
  • Continuity of Operation Plan

Answer : IT Contingency Plan

A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?


Options are :

  • Confidentiality
  • Availability (Correct)
  • Integrity
  • Succession planning

Answer : Availability

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 3

Pete, the system administrator, is reviewing his disaster recovery plans. He wishes to limit the downtime in the event of a disaster, but does not have the budget approval to implement or maintain an offsite location that ensures 99.99% availability. Which of the following would be Pete’s BEST option?


Options are :

  • Move the servers and data to another part of the company’s main campus from the server room.
  • Retain data back-ups on the main campus and establish redundant servers in a virtual environment.
  • Use hardware already at an offsite location and configure it to be quickly utilized. (Correct)
  • Move the data back-ups to the offsite location, but retain the hardware on the main campus for redundancy.

Answer : Use hardware already at an offsite location and configure it to be quickly utilized.

Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?


Options are :

  • Business impact analysis
  • Continuity of operations
  • Business continuity planning
  • Business impact analysis (Correct)

Answer : Business impact analysis

Which of the following provides data the best fault tolerance at the LOWEST cost?


Options are :

  • RAID 6 (Correct)
  • Load balancing
  • Clustering
  • Server virtualization

Answer : RAID 6

SK0-004 CompTIA Server+ Certification Practice Exam Set 2

Which of the following provides the BEST application availability and is easily expanded as demand grows?


Options are :

  • Active-Passive Cluster
  • Load balancing (Correct)
  • RAID 6
  • Server virtualization

Answer : Load balancing

A company replaces a number of devices with a mobile appliance, combining several functions. Which of the following descriptions fits this new implementation? (Select TWO).


Options are :

  • Virtualization
  • Single point of failure (Correct)
  • Cloud computing
  • Load balancing
  • All-in-one device (Correct)

Answer : Single point of failure All-in-one device

Which of the following risk concepts requires an organization to determine the number of failures per year?


Options are :

  • MTBF
  • SLE
  • Quantitative analysis
  • ALE (Correct)

Answer : ALE

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Which of the following disaster recovery strategies has the highest cost and shortest recovery time?


Options are :

  • Co-location site
  • Cold site
  • Warm site
  • Hot site (Correct)

Answer : Hot site

Which of the following technologies uses multiple devices to share work?


Options are :

  • Switching
  • Load balancing (Correct)
  • VPN concentrator
  • RAID

Answer : Load balancing

After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the document is no longer encrypted. Which of the following can a security technician implement to ensure that documents stored on Joe’s desktop remain encrypted when moved to external media or other network based storage?


Options are :

  • Database record level encryption
  • Whole disk encryption
  • Removable disk encryption
  • File level encryption (Correct)

Answer : File level encryption

CompTIA Security+ SY0-501 Questions & Answers Set 1

Sara, a security architect, has developed a framework in which several authentication servers work together to increase processing power for an application. Which of the following does this represent?


Options are :

  • Clustering (Correct)
  • Warm site
  • RAID
  • Load balancing

Answer : Clustering

The main corporate website has a service level agreement that requires availability 100% of the time, even in the case of a disaster. Which of the following would be required to meet this demand?


Options are :

  • Geographically disparate site redundant datacenter (Correct)
  • Cold site implementation for the datacenter
  • Localized clustering of the datacenter
  • Warm site implementation for the datacenter

Answer : Geographically disparate site redundant datacenter

Joe, the system administrator, is performing an overnight system refresh of hundreds of user computers. The refresh has a strict timeframe and must have zero downtime during business hours. Which of the following should Joe take into consideration?


Options are :

  • A back-out strategy planned out anticipating any unforeseen problems that may arise. (Correct)
  • An offsite contingency server farm that can act as a warm site should any issues appear.
  • A disk-based image of every computer as they are being replaced.
  • A plan that skips every other replaced computer to limit the area of affected users.

Answer : A back-out strategy planned out anticipating any unforeseen problems that may arise.

N10-006 CompTIA Network+ Certification Practice Test Set 1

Which of the following can be utilized in order to provide temporary IT support during a disaster, where the organization sets aside funds for contingencies, but does not necessarily have a dedicated site to restore those services?


Options are :

  • Cold site
  • Mobile site (Correct)
  • Hot site
  • Warm site

Answer : Mobile site

Joe, the system administrator, has been asked to calculate the Annual Loss Expectancy (ALE) for a $5,000 server, which often crashes. In the past year, the server has crashed 10 times, requiring a system reboot to recover with only 10% loss of data or function. Which of the following is the ALE of this server?


Options are :

  • $5,000 (Correct)
  • $25,000
  • $500
  • $50,000

Answer : $5,000

Which of the following risks could IT management be mitigating by removing an all-inone device?


Options are :

  • Single sign on
  • Continuity of operations
  • Single point of failure (Correct)
  • Input validation

Answer : Single point of failure

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

Ann is starting a disaster recovery program. She has gathered specifics and team members for a meeting on site. Which of the following types of tests is this?


Options are :

  • Checklist test
  • Tabletop exercise
  • Structured walkthrough (Correct)
  • Full Interruption test

Answer : Structured walkthrough

Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use to verify the validity’s of Joe’s certificate? (Select TWO).


Options are :

  • Joe’s public key (Correct)
  • The CA’s private key
  • Joe’s private key
  • Ann’s private key
  • Ann’s public key
  • The CA’s public key (Correct)

Answer : Joe’s public key The CA’s public key

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 7

A company recently experienced data loss when a server crashed due to a midday power outage. Which of the following should be used to prevent this from occurring again?


Options are :

  • Environmental monitoring
  • Recovery procedures
  • Redundancy (Correct)
  • EMI shielding

Answer : Redundancy

An encrypted message is sent using PKI from Sara, a client, to a customer. Sara claims she never sent the message. Which of the following aspects of PKI BEST ensures the identity of the sender?


Options are :

  • Recovery agents
  • Non-repudiation (Correct)
  • Trust models
  • CRL

Answer : Non-repudiation

An administrator has successfully implemented SSL on srv4.comptia.com using wildcard certificate *.comptia.com, and now wishes to implement SSL on srv5.comptia.com. Which of the following files should be copied from srv4 to accomplish this?


Options are :

  • certificate, root certificate, and certificate signing request
  • certificate, public key, and certificate signing request
  • certificate, private key, and intermediate certificate chain (Correct)
  • certificate, intermediate certificate chain, and root certificate

Answer : certificate, private key, and intermediate certificate chain

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 4

A security manager requires fencing around the perimeter, and cipher locks on all entrances. The manager is concerned with which of the following security controls?


Options are :

  • Availability
  • Integrity
  • Confidentiality
  • Safety (Correct)

Answer : Safety

Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?


Options are :

  • Block ciphers
  • Stream ciphers
  • Hashing (Correct)
  • Steganography

Answer : Hashing

A major security risk with co-mingling of hosts with different security requirements is:


Options are :

  • Security policy violations. (Correct)
  • Privilege creep.
  • Password compromises.
  • Zombie attacks.

Answer : Security policy violations.

CompTIA JK0-022 Security Cryptography Certification Exam Set 8

Which of the following is used by the recipient of a digitally signed email to verify the identity of the sender?


Options are :

  • Sender’s public key (Correct)
  • Recipient’s public key
  • Recipient’s private key
  • Sender’s private key

Answer : Sender’s public key

Joe, a security analyst, asks each employee of an organization to sign a statement saying that they understand how their activities may be monitored. Which of the following BEST describes this statement? (Select TWO).


Options are :

  • Email policy
  • Security policy
  • Acceptable use policy (Correct)
  • Privacy policy (Correct)
  • Risk acceptance policy

Answer : Acceptable use policy Privacy policy

Matt, a forensic analyst, wants to obtain the digital fingerprint for a given message. The message is 160-bits long. Which of the following hashing methods would Matt have to use to obtain this digital fingerprint?


Options are :

  • MD2
  • MD5
  • MD4
  • SHA1 (Correct)

Answer : SHA1

N10-006 CompTIA Network+ Certification Practice Test Set 9

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions