CompTIA JK0-022 E2C Security Data & Host Security Exam Set 7

Which of the following practices reduces the management burden of access management?


Options are :

  • User account audit
  • Group based privileges (Correct)
  • Log analysis and review
  • Password complexity policies

Answer : Group based privileges

CD0-001 CDIA+ Certification Practice Exam Set 2

Which of the following techniques can be used to prevent the disclosure of system information resulting from arbitrary inputs when implemented properly?


Options are :

  • Patch management
  • Fuzzing
  • Strong passwords
  • Error handling (Correct)

Answer : Error handling

In order for network monitoring to work properly, you need a PC and a network card running in what mode?


Options are :

  • Sweep
  • Launch
  • Exposed
  • Promiscuous (Correct)

Answer : Promiscuous

A new intern was assigned to the system engineering department, which consists of the system architect and system software developer?s teams. These two teams have separate privileges. The intern requires privileges to view the system architectural drawings and comment on some software development projects. Which of the following methods should the system administrator implement?


Options are :

  • Generic account prohibition
  • Group based privileges (Correct)
  • Credential management
  • User access review

Answer : Group based privileges

CompTIA N10-004 Network+ Certification Practice Test Set 5

Which of the following techniques enables a highly secured organization to assess security weaknesses in real time?


Options are :

  • Video surveillance
  • Baseline reporting
  • Access control lists
  • Continuous monitoring (Correct)

Answer : Continuous monitoring

Which of the following security concepts identifies input variables which are then used to perform boundary testing?


Options are :

  • Application hardening
  • Fuzzing (Correct)
  • Secure coding
  • Application baseline

Answer : Fuzzing

Which of the following application security principles involves inputting random data into a program?


Options are :

  • Fuzzing (Correct)
  • Brute force attack
  • Sniffing
  • Buffer overflow

Answer : Fuzzing

CompTIA N10-004 Network+ Certification Practice Test Set 7

In regards to secure coding practices, why is input validation important?


Options are :

  • It mitigates buffer overflow attacks. (Correct)
  • It makes the code more readable.
  • It provides an application configuration baseline.
  • It meets gray box testing standards.

Answer : It mitigates buffer overflow attacks.

An IT security technician is actively involved in identifying coding issues for her company. Which of the following is an application security technique that can be used to identify unknown weaknesses within the code?


Options are :

  • Fuzzing (Correct)
  • Denial of service
  • Port scanning
  • Vulnerability scanning

Answer : Fuzzing

A system administrator needs to ensure that certain departments have more restrictive controls to their shared folders than other departments. Which of the following security controls would be implemented to restrict those departments?


Options are :

  • Multiple account creation
  • User assigned privileges
  • Group based privileges (Correct)
  • Password disablement

Answer : Group based privileges

220-701 A+ Essentials Certification Practice Exam Set 3

Which of the following would Jane, an administrator, use to detect an unknown securityvulnerability?


Options are :

  • Application fuzzing (Correct)
  • Patch management
  • ID badge
  • Application configuration baseline

Answer : Application fuzzing

Which of the following application security testing techniques is implemented when an automated system generates random input data?


Options are :

  • Fuzzing (Correct)
  • Input validation
  • Hardening
  • XSRF

Answer : Fuzzing

Privilege creep among long-term employees can be mitigated by which of the following procedures?


Options are :

  • Separation of duties
  • Mandatory vacations
  • Job function rotation
  • User permission reviews (Correct)

Answer : User permission reviews

Mock : CompTIA CySA+ (CS0-001)

Which of the following is true about input validation in a client-server architecture, when data integrity is critical to the organization?


Options are :

  • It should be enforced on the client side only.
  • It must be protected by SSL encryption.
  • It should be performed on the server side. (Correct)
  • It must rely on the user?s knowledge of the application.

Answer : It should be performed on the server side.

A recent audit of a company?s identity management system shows that 30% of active accounts belong to people no longer with the firm. Which of the following should be performed to help avoid this scenario? (Select TWO).


Options are :

  • Perform regular user account review / revalidation process (Correct)
  • Automatically disable accounts that have not been utilized for at least 10 days.
  • Implement a process where new account creations require management approval.
  • Utilize automated provisioning and de-provisioning processes where possible. (Correct)
  • Request that employees provide a list of systems that they have access to prior to leaving the firm.

Answer : Perform regular user account review / revalidation process Utilize automated provisioning and de-provisioning processes where possible.

One of the most consistently reported software security vulnerabilities that leads to major exploits is:


Options are :

  • Attack surface decrease.
  • Inadequate network hardening.
  • Lack of malware detection.
  • Poor input validation. (Correct)

Answer : Poor input validation.

JK0-019 CompTIA E2C Network + Certification Exam Set 10

The fundamental information security principals include confidentiality, availability and which of the following?


Options are :

  • The capacity of a system to resist unauthorized changes to stored information (Correct)
  • The confidence with which a system can attest to the identity of a user
  • The characteristic of a system to provide uninterrupted service to authorized users
  • The ability to secure data against unauthorized disclosure to external sources

Answer : The capacity of a system to resist unauthorized changes to stored information

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

A security administrator implements access controls based on the security classification of the data and need-to-know information. Which of the following BEST describes this level of access control?


Options are :

  • Least privilege
  • Role-based Access Control
  • Implicit deny
  • Mandatory Access Controls (Correct)

Answer : Mandatory Access Controls

One of the most basic ways to protect the confidentiality of data on a laptop in the event the device is physically stolen is to implement which of the following?


Options are :

  • Whole disk encryption with two-factor authentication (Correct)
  • Biometric authentication and cloud storage
  • BIOS passwords and two-factor authentication
  • File level encryption with alphanumeric passwords

Answer : Whole disk encryption with two-factor authentication

A network administrator uses an RFID card to enter the datacenter, a key to open the server rack, and a username and password to logon to a server. These are examples of which of the following?


Options are :

  • Multifactor authentication
  • Identification
  • Single factor authentication (Correct)
  • Separation of duties

Answer : Single factor authentication

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 9

Which of the following is the difference between identification and authentication of a user?


Options are :

  • Identification proves who the user is and authentication tells the user what they are allowed to do.
  • Identification proves who the user is and authentication is used to keep the users data secure.
  • Identification tells who the user is and authentication tells whether the user is allowed to logon to a system.
  • Identification tells who the user is and authentication proves it. (Correct)

Answer : Identification tells who the user is and authentication proves it.

Joe Has read and write access to his own home directory. Joe and Ann are collaborating on a project, and Joe would like to give Ann write access to one particular file in this home directory. Which of the following types of access control would this reflect?


Options are :

  • Rule-based access control
  • Role-based access control
  • Discretionary access control (Correct)
  • Mandatory access control

Answer : Discretionary access control

A system administrator is configuring UNIX accounts to authenticate against an external server. The configuration file asks for the following information DC=ServerName and DC=COM. Which of the following authentication services is being used?


Options are :

  • LDAP (Correct)
  • RADIUS
  • TACACS+
  • SAML

Answer : LDAP

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 6

Which of the following BEST describes using a smart card and typing in a PIN to gain access to a system?


Options are :

  • PKI
  • Biometrics
  • Multifactor authentication (Correct)
  • Single factor authentication

Answer : Multifactor authentication

Which of the following presents the STRONGEST access control?


Options are :

  • DAC
  • MAC (Correct)
  • RBAC
  • TACACS

Answer : MAC

Which of the following is an example of multifactor authentication?


Options are :

  • Fingerprint and retina scan
  • Username and password
  • Password and PIN
  • Credit card and PIN (Correct)

Answer : Credit card and PIN

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 8

A user ID and password together provide which of the following?


Options are :

  • Authorization
  • Auditing
  • Authentication (Correct)
  • Identification

Answer : Authentication

Ann, the security administrator, wishes to implement multifactor security. Which of the following should be implemented in order to compliment password usage and smart cards?


Options are :

  • Hard tokens
  • Fingerprint readers (Correct)
  • Passphrases
  • Swipe badge readers

Answer : Fingerprint readers

The IT department has setup a share point site to be used on the intranet. Security has established the groups and permissions on the site. No one may modify the permissions and all requests for access are centrally managed by the security team. This is an example of which of the following control types?


Options are :

  • User assigned privilege
  • Discretionary access control (Correct)
  • Mandatory access control
  • Rule based access control

Answer : Discretionary access control

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 3

The company?s sales team plans to work late to provide the Chief Executive Officer (CEO) with a special report of sales before the quarter ends. After working for several hours, the team finds they cannot save or print the reports.Which of the following controls is preventing them from completing their work?


Options are :

  • Mandatory access control
  • Time of Day access control (Correct)
  • Role-based access control
  • Discretionary access control

Answer : Time of Day access control

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions