CompTIA JK0-022 E2C Security Data & Host Security Exam Set 3

Which of the following encompasses application patch management?


Options are :

  • Configuration management (Correct)
  • Policy management
  • Fuzzing
  • Cross-site request forgery

Answer : Configuration management

Which of the following MOST interferes with network-based detection techniques?


Options are :

  • SSL (Correct)
  • Anonymous email accounts
  • Mime-encoding
  • FTP

Answer : SSL

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 5

Which of the following solutions provides the most flexibility when testing new security controls prior to implementation?


Options are :

  • Virtualization (Correct)
  • Trusted OS
  • Host software baselining
  • OS hardening

Answer : Virtualization

Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specific table?


Options are :

  • Removable media
  • Database (Correct)
  • Full disk
  • Individual files

Answer : Database

Identifying a list of all approved software on a system is a step in which of the following practices?


Options are :

  • Host software baselining (Correct)
  • Application hardening
  • Client-side targeting
  • Passively testing security controls

Answer : Host software baselining

FC0-TS1 CompTIA Strata IT for Sales Practice Exam Set 3

Which of the following can be used to mitigate risk if a mobile device is lost?


Options are :

  • Voice encryption
  • Cable lock
  • Strong passwords (Correct)
  • Transport encryption

Answer : Strong passwords

Which of the following does full disk encryption prevent?


Options are :

  • Clear text access (Correct)
  • Network-based attacks
  • Database theft
  • Client side attacks

Answer : Clear text access

Which of the following is the BEST method for ensuring all files and folders are encrypted on all corporate laptops where the file structures are unknown?


Options are :

  • Whole disk encryption (Correct)
  • Folder encryption
  • Steganography
  • File encryption

Answer : Whole disk encryption

CompTIA JK0-022 Security Cryptography Certification Exam Set 2

Full disk encryption is MOST effective against which of the following threats?


Options are :

  • Denial of service by data destruction
  • Malicious code
  • Eavesdropping emanations
  • Theft of hardware (Correct)

Answer : Theft of hardware

Which of the following can be used to maintain a higher level of security in a SAN by allowing isolation of mis-configurations or faults?


Options are :

  • Protocol security
  • VSAN (Correct)
  • Port security
  • VLAN

Answer : VSAN

A company is about to release a very large patch to its customers. An administrator is required to test patch installations several times prior to distributing them to customer PCs. Which of the following should the administrator use to test the patching process quickly and often?


Options are :

  • Create a virtualized sandbox and utilize snapshots (Correct)
  • Create an incremental backup of an unpatched PC
  • Create an image of a patched PC and replicate it to servers
  • Create a full disk image to restore after each installation

Answer : Create a virtualized sandbox and utilize snapshots

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 3

Which of the following is a way to implement a technical control to mitigate data loss in case of a mobile device theft?


Options are :

  • Disk encryption (Correct)
  • Solid state drive
  • Mobile device policy
  • Encryption policy

Answer : Disk encryption

Which of the following is an advantage of implementing individual file encryption on a hard drive which already deploys full disk encryption?


Options are :

  • File level access control only apply to individually encrypted files in a fully encrypted drive
  • Reduces processing overhead required to access the encrypted files
  • Individually encrypted files will remain encrypted when copied to external media (Correct)
  • Double encryption causes the individually encrypted files to partially lose their properties

Answer : Individually encrypted files will remain encrypted when copied to external media

A security administrator has concerns regarding employees saving data on company provided mobile devices. Which of the following would BEST address the administrator?s concerns?


Options are :

  • Enable GPS functionality to track the location of the mobile devices.
  • Create a company policy prohibiting the use of mobile devices for personal use.
  • Configure the devices so that removable media use is disabled. (Correct)
  • Install a mobile application that tracks read and write functions on the device.

Answer : Configure the devices so that removable media use is disabled.

220-802 CompTIA A+ Certification Practice Exam Set 6

A technician has implemented a system in which all workstations on the network will receive security updates on the same schedule. Which of the following concepts does this illustrate?


Options are :

  • Application hardening
  • Black box testing
  • Patch management (Correct)
  • White box testing

Answer : Patch management

The information security technician wants to ensure security controls are deployed and functioning as intended to be able to maintain an appropriate security posture. Which of the following security techniques is MOST appropriate to do this?


Options are :

  • System hardening
  • Log audits
  • Use IPS/IDS
  • Continuous security monitoring (Correct)

Answer : Continuous security monitoring

A company needs to receive data that contains personally identifiable information. The company requires both the transmission and data at rest to be encrypted. Which of the following achieves this goal? (Select TWO).


Options are :

  • SSH (Correct)
  • SMTP
  • TFTP
  • TKIP
  • NTLM
  • PGP/GPG (Correct)

Answer : SSH PGP/GPG

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 1

Which of the following would be used when a higher level of security is desired for encryption key storage?


Options are :

  • L2TP
  • TACACS+
  • TPM (Correct)
  • LDAP

Answer : TPM

Which of the following is a vulnerability associated with disabling pop-up blockers?


Options are :

  • The help window may not be displayed
  • Another browser instance may execute malicious code (Correct)
  • A form submitted by the user may not open
  • An alert message from the administrator may not be visible

Answer : Another browser instance may execute malicious code

Joe, a network security engineer, has visibility to network traffic through network monitoring tools. However, he?s concerned that a disgruntled employee may be targeting a server containing the company?s financial records. Which of the following security mechanism would be MOST appropriate to confirm Joe?s suspicion?


Options are :

  • HIDS (Correct)
  • NIDS
  • NIPS
  • HIPS

Answer : HIDS

CompTIA IT Fundamentals (Exam FC0-U61) Practice Tests Set 3

Access mechanisms to data on encrypted USB hard drives must be implemented correctly otherwise:


Options are :

  • data on the USB drive could be corrupted.
  • the security controls on the USB drive can be bypassed. (Correct)
  • user accounts may be inadvertently locked out.
  • data on the hard drive will be vulnerable to log analysis.

Answer : the security controls on the USB drive can be bypassed.

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 9

Which of the following data security techniques will allow Matt, an IT security technician, to encrypt a system with speed as its primary consideration?


Options are :

  • Hard drive encryption (Correct)
  • Infrastructure as a service
  • Data loss prevention
  • Software based encryption

Answer : Hard drive encryption

During a recent investigation, an auditor discovered that an engineer?s compromised workstation was being used to connect to SCADA systems while the engineer was not logged in. The engineer is responsible for administering the SCADA systems and cannot be blocked from connecting to them. The SCADA systems cannot be modified without vendor approval which requires months of testing.Which of the following is MOST likely to protect the SCADA systems from misuse?


Options are :

  • Update anti-virus definitions on SCADA systems
  • Install a firewall on the SCADA network
  • Deploy NIPS at the edge of the SCADA network (Correct)
  • Audit accounts on the SCADA systems

Answer : Deploy NIPS at the edge of the SCADA network

Which of the following is built into the hardware of most laptops but is not setup for centralized management by default?


Options are :

  • Individual file encryption
  • Whole disk encryption
  • Removal Media (Correct)
  • USB encryption

Answer : Removal Media

220-701 A+ Essentials Certification Practice Exam Set 9

Which of the following provides dedicated hardware-based cryptographic functions to an operating system and its applications running on laptops and desktops?


Options are :

  • TPM (Correct)
  • FPU
  • HSM
  • CPU

Answer : TPM

Ann, a security administrator, wishes to replace their RADIUS authentication with a more secure protocol, which can utilize EAP. Which of the following would BEST fit her objective?


Options are :

  • SAML
  • Kerberos
  • Diameter (Correct)
  • CHAP

Answer : Diameter

Jane, a security administrator, has been tasked with explaining authentication services to the company?s management team. The company runs an active directory infrastructure. Which of the following solutions BEST relates to the host authentication protocol within the company?s environment?


Options are :

  • Least privilege
  • Kerberos (Correct)
  • TACACS+
  • LDAP

Answer : Kerberos

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 9

Which of the following relies on the use of shared secrets to protect communication?


Options are :

  • Kerberos
  • RADIUS (Correct)
  • PKI
  • LDAP

Answer : RADIUS

A hospital IT department wanted to secure its doctor?s tablets. The IT department wants operating system level security and the ability to secure the data from alteration. Which of the following methods would MOST likely work?


Options are :

  • Cloud storage
  • TPM (Correct)
  • Wiping
  • Removal Media

Answer : TPM

Which of the following are examples of network segmentation? (Select TWO).


Options are :

  • IDS
  • IPS
  • IaaS
  • Subnet (Correct)
  • DMZ (Correct)

Answer : Subnet DMZ

JK0-019 CompTIA E2C Network + Certification Exam Set 2

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions