CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 1

The security administrator has been tasked to update all the access points to provide a more secure connection. All access points currently use WPA TKIP for encryption. Which of the following would be configured to provide more secure connections?


Options are :

  • WPA2 CCMP
  • MAC filtering
  • WEP
  • Disable SSID broadcast and increase power levels

Answer : WPA2 CCMP

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 12

A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the vendors using older technology report that they are unable to access the wireless network after entering the correct network information. Which of the following is the MOST likely reason for this issue?


Options are :

  • The company is not using strong enough encryption.
  • The SSID broadcast is disabled.
  • The company is using the wrong antenna type.
  • The MAC filtering is disabled on the access point.

Answer : The SSID broadcast is disabled.

A network administrator has been tasked with securing the WLAN. Which of the following cryptographic products would be used to provide the MOST secure environment for the WLAN?


Options are :

  • WPA2 CCMP
  • WPA2 TKIP
  • WPA
  • WPA with MAC filtering

Answer : WPA2 CCMP

Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to connect to that AP and gain unauthorized access. Which of the following would be the BEST way to mitigate this issue and still provide coverage where needed? (Select TWO).


Options are :

  • Disable SSID broadcast
  • Enable MAC filtering
  • Use channels 1, 4 and 7 only
  • Disable the wired ports

Answer : Disable SSID broadcast Enable MAC filtering

CompTIA PenTest+ Certified for Cybersecurity Professionals Set 2

If you don't know the MAC address of a Linux-based machine, what command-line utility can you use to ascertain it?


Options are :

  • macconfig
  • ifconfig
  • ipconfig
  • config

Answer : ifconfig

A security administrator must implement a wireless security system, which will require users to enter a 30 character ASCII password on their accounts. Additionally the system must support 3DS wireless encryption.Which of the following should be implemented?


Options are :

  • WPA2-Enterprise
  • WPA2-CCMP
  • WPA2-CCMP with 802.1
  • WPA2-PSK

Answer : WPA2-Enterprise

An access point has been configured for AES encryption but a client is unable to connect to it. Which of the following should be configured on the client to fix this issue?


Options are :

  • RC4
  • TKIP
  • WEP
  • CCMP

Answer : CCMP

CompTIA JK0-022 Security Cryptography Certification Exam Set 1

Which of the following would satisfy wireless network implementation requirements to use mutual authentication and usernames and passwords?


Options are :

  • EAP-TLS
  • WEP
  • EAP-MD5
  • PEAP-MSCHAPv2

Answer : PEAP-MSCHAPv2

After entering the following information into a SOHO wireless router, a mobile device's user reports being unable to connect to the network: Which of the following is preventing the device from connecting?


Options are :

  • IP address filtering has disabled the device from connecting.
  • Hardware address filtering is blocking the device.
  • WPA2-PSK requires a supplicant on the mobile device.
  • TCP/IP Port filtering has been implemented on the SOHO router.

Answer : Hardware address filtering is blocking the device.

While previously recommended as a security measure, disabling SSID broadcast is not effective against most attackers because network SSIDs are:


Options are :

  • contained in certain wireless packets in plaintext.
  • no longer used to authenticate to most wireless networks.
  • no longer supported in 802.11 protocols.
  • contained in all wireless broadcast packets by default.

Answer : contained in certain wireless packets in plaintext.

220-702 CompTIA A+ Practical Application Practice Exam Set 12

A security architect wishes to implement a wireless network with connectivity to the company's internal network. Before they inform all employees that this network is being put in place, the architect wants to roll it out to a small test segment. Which of the following allows for greater secrecy about this network during this initial phase of implementation?


Options are :

  • Filtering test workstations by MAC address
  • Implementing WPA2 - TKIP
  • Disabling SSID broadcasting
  • Implementing WPA2 - CCMP

Answer : Disabling SSID broadcasting

Configuring key/value pairs on a RADIUS server is associated with deploying which of the following?


Options are :

  • Digital certificates
  • Intrusion detection system
  • WPA2-Enterprise wireless network
  • DNS secondary zones

Answer : WPA2-Enterprise wireless network

Ann, a sales manager, successfully connected her company-issued smartphone to the wireless network in her office without supplying a username/password combination. Upon disconnecting from the wireless network, she attempted to connect her personal tablet computer to the same wireless network and could not connect.Which of the following is MOST likely the reason?


Options are :

  • The company wireless is using a MAC filter.
  • The company wireless is using WEP.
  • The company wireless is using WPA2.
  • The company wireless has SSID broadcast disabled.

Answer : The company wireless is using a MAC filter.

CT0-101 Convergence+ Certification Practice Exam Set 9

Matt, a systems security engineer, is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate, has a server side certificate, and uses TLS tunnels for encryption. Which credential type authentication method BEST fits these requirements?


Options are :

  • EAP-FAST
  • EAP-TLS
  • PEAP-MSCHAPv2
  • PEAP-CHAP

Answer : PEAP-MSCHAPv2

A security analyst has been tasked with securing a guest wireless network. They recommend the company use an authentication server but are told the funds are not available to set this up. Which of the following BEST allows the analyst to restrict user access to approved devices?


Options are :

  • Power level adjustment
  • Disable SSID broadcasting
  • Antenna placement
  • MAC filtering

Answer : MAC filtering

A security administrator wishes to increase the security of the wireless network. Which of the following BEST addresses this concern?


Options are :

  • Configure the access point to use WEP instead of WPA2.
  • Change the encryption from TKIP-based to CCMP-based.
  • Set all nearby access points to operate on the same channel.
  • Enable all access points to broadcast their SSIDs.

Answer : Change the encryption from TKIP-based to CCMP-based.

CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 2

Which of the following wireless security technologies continuously supplies new keys for WEP?


Options are :

  • WPA2
  • TKIP
  • Mac filtering
  • WPA

Answer : TKIP

A system administrator wants to enable WPA2 CCMP. Which of the following is the only encryption used?


Options are :

  • RC4
  • DES
  • 3DES
  • AES

Answer : AES

Which of the following means of wireless authentication is easily vulnerable to spoofing?


Options are :

  • WPA - LEAP
  • MAC Filtering
  • WPA - PEAP
  • Enabled SSID

Answer : MAC Filtering

CT0-101 Convergence+ Certification Practice Exam Set 1

An organization does not want the wireless network name to be easily discovered. Which of the following software features should be configured on the access points?


Options are :

  • SSID broadcast
  • WPA2
  • MAC filter
  • Antenna placement

Answer : SSID broadcast

Which of the following best practices makes a wireless network more difficult to find?


Options are :

  • UseWPA2-PSK
  • Disable SSID broadcast
  • Power down unused WAPs
  • Implement MAC filtering

Answer : Disable SSID broadcast

Jane, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Jane when deploying a new access point?


Options are :

  • Enabling the MAC filtering
  • Placement of antenna
  • Disabling the SSID
  • Implementing WPA2

Answer : Placement of antenna

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 25

A security administrator must implement a network authentication solution which will ensure encryption of user credentials when users enter their username and password to authenticate to the network. Which of the following should the administrator implement?


Options are :

  • WPA2 with WPS
  • WPA-PSK
  • WEP over EAP-PEAP
  • WPA2 over EAP-TTLS

Answer : WEP over EAP-PEAP

A network consists of various remote sites that connect back to two main locations. Pete, the security administrator, needs to block TELNET access into the network. Which of the following, by default, would be the BEST choice to accomplish this goal?


Options are :

  • Block port 23 on the network firewall
  • Block port 25 on the network firewall
  • Block port 23 on the L2 switch at each remote site
  • Block port 25 on the L2 switch at each remote site

Answer : Block port 23 on the network firewall

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 19

Which of the following ports is used to securely transfer files between remote UNIX systems?


Options are :

  • 22
  • 21
  • 69
  • 445

Answer : 22

Which of the following uses port 22 by default? (Select THREE).


Options are :

  • SSH
  • TLS
  • SSL
  • SFTP
  • SCP

Answer : SSH SFTP SCP

Which of the following is a step in deploying a WPA2-Enterprise wireless network?


Options are :

  • Install an encryption key on the authentication server
  • Install a token on the authentication server
  • Install a digital certificate on the authentication server
  • Install a DHCP server on the authentication server

Answer : Install a digital certificate on the authentication server

NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 11

Which of the following is the default port for TFTP?


Options are :

  • 21
  • 69
  • 20
  • 68

Answer : 69

A security technician needs to open ports on a firewall to allow for domain name resolution. Which of the following ports should be opened? (Select TWO).


Options are :

  • UDP 53
  • UDP 23
  • TCP 21
  • TCP 23
  • TCP 53

Answer : UDP 53 TCP 53

Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation?


Options are :

  • Disable SSID
  • Adjust antenna placement
  • Implement WPA
  • Implement WEP

Answer : Implement WPA

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 6

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions