CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 3

Due to limited resources, a company must reduce their hardware budget while still maintaining availability. Which of the following would MOST likely help them achieve their objectives?


Options are :

  • Network access control
  • Virtualization
  • Remote access
  • Blade servers

Answer : Virtualization

A computer is put into a restricted VLAN until the computer's virus definitions are up-todate. Which of the following BEST describes this system type?


Options are :

  • DMZ
  • NAT
  • NAC
  • NIPS

Answer : NAC

A security analyst is reviewing firewall logs while investigating a compromised web server. The following ports appear in the log: Which of the following protocols was used to access the server remotely?


Options are :

  • HTTP
  • HTTPS
  • RDP
  • LDAP

Answer : RDP

CompTIA JK0-022 E2C Security Data & Host Security Exam Set 1

An auditor is given access to a conference room to conduct an analysis. When they connect their laptop's Ethernet cable into the wall jack, they are not able to get a connection to the Internet but have a link light. Which of the following is MOST likely causing this issue?


Options are :

  • The switch port is administratively shutdown
  • The host firewall is set to disallow outbound connections
  • Ethernet cable is damaged
  • Network Access Control

Answer : Network Access Control

An administrator needs to segment internal traffic between layer 2 devices within the LAN. Which of the following types of network design elements would MOST likely be used?


Options are :

  • Routing
  • VLAN
  • DMZ
  • NAT

Answer : VLAN

Which of the following is a programming interface that allows a remote computer to run programs on a local machine?


Options are :

  • RPC
  • RSH
  • SSL
  • SSH

Answer : RPC

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 6

Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO).


Options are :

  • 10.4.4.125
  • 10.4.4.158
  • 10.4.4.189
  • 10.4.4.165

Answer : 10.4.4.189 10.4.4.165

Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic?


Options are :

  • Create a voice VLAN.
  • Create a DMZ.
  • Set the switch ports to 802.1q mode.
  • Connect the WAP to a different switch.

Answer : Create a voice VLAN.

An administrator wishes to hide the network addresses of an internal network when connecting to the Internet. The MOST effective way to mask the network address of the users would be by passing the traffic through a:


Options are :

  • NIPS
  • packet-filtering firewall
  • stateful firewall
  • NAT

Answer : NAT

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 7

According to company policy an administrator must logically keep the Human Resources department separated from the Accounting department. Which of the following would be the simplest way to accomplish this?


Options are :

  • NIDS
  • NAT
  • DMZ
  • VLAN

Answer : VLAN

Which of the following would allow the organization to divide a Class C IP address range into several ranges?


Options are :

  • Subnetting
  • Virtual LANs
  • NAT
  • DMZ

Answer : Subnetting

Which of the following would Pete, a security administrator, MOST likely implement in order to allow employees to have secure remote access to certain internal network services such as file servers?


Options are :

  • VPN gateway
  • Switch
  • Router
  • Packet filtering firewall

Answer : VPN gateway

CA1-001 CompTIA Advanced Security Practitioner Practice Exam Set 6

Pete, a security administrator, is informed that people from the HR department should not have access to the accounting department's server, and the accounting department should not have access to the HR department's server. The network is separated by switches. Which of the following is designed to keep the HR department users from accessing the accounting department's server and vice-versa?


Options are :

  • ACLs
  • VLANs
  • NATS
  • DMZs

Answer : VLANs

Which of the following should be performed to increase the availability of IP telephony by prioritizing traffic?


Options are :

  • Subnetting
  • NAT
  • Quality of service
  • NAC

Answer : Quality of service

Review the following diagram depicting communication between PC1 and PC2 on each side of a router. Analyze the network traffic logs which show communication between the two computers as captured by the computer with IP 10.2.2.10.Given the above information, which of the following can be inferred about the above environment?


Options are :

  • The router filters port 80 traffic.
  • 192.168.1.30 is a web server.
  • The web server listens on a non-standard port.
  • The router implements NAT.

Answer : The router implements NAT.

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 1

A network engineer is setting up a network for a company. There is a BYOD policy for the employees so that they can connect their laptops and mobile devices. Which of the following technologies should be employed to separate the administrative network from the network in which all of the employees' devices are connected?


Options are :

  • WPA2
  • MAC filtering
  • VLAN
  • VPN

Answer : VLAN

When designing a new network infrastructure, a security administrator requests that the intranet web server be placed in an isolated area of the network for security purposes. Which of the following design elements would be implemented to comply with the security administrator's request?


Options are :

  • Sandboxing
  • Cloud services
  • DMZ
  • Virtualization

Answer : DMZ

An IT director is looking to reduce the footprint of their company's server environment. They have decided to move several internally developed software applications to an alternate environment, supported by an external company. Which of the following BEST describes this arrangement?


Options are :

  • Software as a Service
  • Storage as a Service
  • Infrastructure as a Service
  • Platform as a Service

Answer : Infrastructure as a Service

FC0-TS1 CompTIA Strata IT for Sales Practice Exam Set 1

Which of the following BEST describes a demilitarized zone?


Options are :

  • A buffer zone between protected and unprotected networks.
  • A sterile, isolated network segment with access lists.
  • A network where all servers exist and are monitored.
  • A private network that is protected by a firewall and a VLAN.

Answer : A buffer zone between protected and unprotected networks.

The Chief Information Officer (CIO) has mandated web based Customer Relationship Management (CRM) business functions be moved offshore to reduce cost, reduce IT overheads, and improve availability. The Chief Risk Officer (CRO) has agreed with the CIO's direction but has mandated that key authentication systems be run within the organization's network. Which of the following would BEST meet the CIO and CRO's requirements?


Options are :

  • Infrastructure as a Service
  • Software as a Service
  • Platform as a Service
  • Hosted virtualization service

Answer : Software as a Service

An administrator connects VoIP phones to the same switch as the network PCs and printers. Which of the following would provide the BEST logical separation of these three device types while still allowing traffic between them via ACL?


Options are :

  • Create three VLANs on the switch connected to a router
  • Install a firewall and connect it to the switch
  • Install a firewall and connect it to a dedicated switch for each device type
  • Define three subnets, configure each device to use their own dedicated IP address range, and then connect the network to a router

Answer : Create three VLANs on the switch connected to a router

CompTIA HT0-201 DHTI+ Certification Practice Exam Set 6

A small company can only afford to buy an all-in-one wireless router/switch. The company has 3 wireless BYOD users and 2 web servers without wireless access. Which of the following should the company configure to protect the servers from the user devices? (Select TWO).


Options are :

  • Deny incoming connections to the outside router interface.
  • Create an ACL to access the server
  • Change the default HTTP port
  • Create a server VLAN
  • Implement EAP-TLS to establish mutual authentication
  • Disable the physical switch ports

Answer : Create an ACL to access the server Create a server VLAN

Which of the following is required to allow multiple servers to exist on one physical server?


Options are :

  • Platform as a Service (PaaS)
  • Infrastructure as a Service (IaaS)
  • Virtualization
  • Software as a Service (SaaS)

Answer : Virtualization

A company determines a need for additional protection from rogue devices plugging into physical ports around the building. Which of the following provides the highest degree of protection from unauthorized wired network access?


Options are :

  • Intrusion Prevention Systems
  • 802.1x
  • Flood guards
  • MAC filtering

Answer : 802.1x

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 10

An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to integrate the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal?


Options are :

  • Unified Threat Management
  • Role-based management
  • Virtual Private Network
  • Single sign on

Answer : Unified Threat Management

While configuring a new access layer switch, the administrator, Joe, was advised that he needed to make sure that only devices authorized to access the network would be permitted to login and utilize resources. Which of the following should the administrator implement to ensure this happens?


Options are :

  • Network separation
  • VLAN Management
  • 802.1x
  • Log Analysis

Answer : 802.1x

Which of the following network architecture concepts is used to securely isolate at the boundary between networks?


Options are :

  • VLAN
  • NAT
  • DMZ
  • Subnetting

Answer : DMZ

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 12

On Monday, all company employees report being unable to connect to the corporate wireless network, which uses 802.1x with PEAP. A technician verifies that no configuration changes were made to the wireless network and its supporting infrastructure, and that there are no outages. Which of the following is the MOST likely cause for this issue?


Options are :

  • The DNS server is overwhelmed with connections and is unable to respond to queries.
  • The Remote Authentication Dial-In User Service server certificate has expired.
  • Too many incorrect authentication attempts have caused users to be temporarily disabled.
  • The company IDS detected a wireless attack and disabled the wireless network.

Answer : The Remote Authentication Dial-In User Service server certificate has expired.

A Chief Information Security Officer (CISO) is tasked with outsourcing the analysis of security logs. These will need to still be reviewed on a regular basis to ensure the security of the company has not been breached. Which of the following cloud service options would support this requirement?


Options are :

  • SaaS
  • MaaS
  • IaaS
  • PaaS

Answer : MaaS

A technician is deploying virtual machines for multiple customers on a single physical host to reduce power consumption in a data center. Which of the following should be recommended to isolate the VMs from one another?


Options are :

  • Implement a virtual firewall
  • Develop a patch management guide
  • Install HIPS on each VM
  • Virtual switches with VLANs

Answer : Virtual switches with VLANs

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 16

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions