CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 6

Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?


Options are :

  • Web application firewall
  • Spam filter
  • Load balancer
  • Protocol analyzer

Answer : Protocol analyzer

Pete, the system administrator, wants to restrict access to advertisements, games, and gambling web sites. Which of the following devices would BEST achieve this goal?


Options are :

  • Firewall
  • Spam filter
  • URL content filter
  • Switch

Answer : URL content filter

Which of the following network design elements allows for many internal devices to share one public IP address?


Options are :

  • DMZ
  • DNS
  • PAT
  • DNAT

Answer : PAT

CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 6

Pete, a security administrator, has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?


Options are :

  • HIDS
  • NIPS
  • HIPS
  • NIDS

Answer : NIPS

An administrator is looking to implement a security device which will be able to not only detect network intrusions at the organization level, but help defend against them as well. Which of the following is being described here?


Options are :

  • NIDS
  • NIPS
  • HIPS
  • HIDS

Answer : NIPS

Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task?


Options are :

  • HIDS
  • NIPS
  • Firewall
  • Spam filter

Answer : NIPS

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 5

Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network. Which of the following types of technologies will BEST address this scenario?


Options are :

  • Application Firewall
  • Signature IDS
  • Anomaly Based IDS
  • Proxy Firewall

Answer : Anomaly Based IDS

Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?


Options are :

  • Router
  • Switch
  • Firewall
  • Sniffer

Answer : Firewall

The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data be segregated from the main corporate network to prevent unauthorized access and that access to the IT systems should be logged. Which of the following would BEST meet the CISO’s requirements?


Options are :

  • NIDS
  • Firewalls
  • Web proxies
  • Sniffers

Answer : Firewalls

CD0-001 CDIA+ Certification Practice Exam Set 9

Ann, a security administrator, has concerns regarding her company’s wireless network. The network is open and available for visiting prospective clients in the conference room, but she notices that many more devices are connecting to the network than should be.Which of the following would BEST alleviate Ann’s concerns with minimum disturbance of current functionality for clients?


Options are :

  • Configure WPA2 encryption on the wireless access point.
  • Enable MAC filtering on the wireless access point.
  • Disable SSID broadcasting.
  • Lower the antenna’s broadcasting power.

Answer : Lower the antenna’s broadcasting power.

An administrator would like to review the effectiveness of existing security in the enterprise. Which of the following would be the BEST place to start?


Options are :

  • Install honey pot systems
  • Implement an intrusion prevention system
  • Rewrite the existing security policy
  • Review past security incidents and their resolution

Answer : Implement an intrusion prevention system

Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?


Options are :

  • Packet Filter Firewall
  • Proxy Firewall
  • Stateful Firewall
  • Application Firewall

Answer : Stateful Firewall

CompTIA IT Fundamentals (Exam FC0-U61) Practice Tests Set 1

The network security engineer just deployed an IDS on the network, but the Chief Technical Officer (CTO) has concerns that the device is only able to detect known anomalies. Which of the following types of IDS has been deployed?


Options are :

  • Signature Based IDS
  • Anomaly Based IDS
  • Heuristic IDS
  • Behavior Based IDS

Answer : Signature Based IDS

Which of the following components of an all-in-one security appliance would MOST likely be configured in order to restrict access to peer-to-peer file sharing websites?


Options are :

  • Spam filter
  • Malware inspection
  • Content inspection
  • URL filter

Answer : URL filter

The security administrator at ABC company received the following log information from an external party: The external party is reporting attacks coming from abc-company.com. Which of the following is the reason the ABC company’s security administrator is unable to determine the origin of the attack?


Options are :

  • The external party uses a firewall.
  • ABC company uses PAT
  • The log is not in UTC.
  • A NIDS was used in place of a NIPS.

Answer : ABC company uses PAT

CompTIA JK0-022 Security Cryptography Certification Exam Set 8

When performing the daily review of the system vulnerability scans of the network Joe, the administrator, noticed several security related vulnerabilities with an assigned vulnerability identification number. Joe researches the assigned vulnerability identification number from the vendor website. Joe proceeds with applying the recommended solution for identified vulnerability. Which of the following is the type of vulnerability described?


Options are :

  • Host based
  • Signature based
  • IDS
  • Network based

Answer : Signature based

The administrator receives a call from an employee named Joe. Joe says the Internet is down and he is receiving a blank page when typing to connect to a popular sports website. The administrator asks Joe to try visiting a popular search engine site, which Joe reports as successful. Joe then says that he can get to the sports site on this phone. Which of the following might the administrator need to configure?


Options are :

  • The default block page on the URL filter
  • The sensitivity level of the spam filter
  • The pop up blocker in the employee’s browser
  • The access rules on the IDS

Answer : The default block page on the URL filter

Pete, the system administrator, wishes to monitor and limit users’ access to external websites. Which of the following would BEST address this?


Options are :

  • Implement NIDS.
  • Install a proxy server.
  • Use server load balancers.
  • Block all traffic on port 80.

Answer : Install a proxy server.

CompTIA JK0-022 E2C Security Data & Host Security Exam Set 8

Which of the following is a best practice when securing a switch from physical access?


Options are :

  • Disable unnecessary accounts
  • Disable unused ports
  • Print baseline configuration
  • Print baseline configuration

Answer : Disable unused ports

Which of the following should be deployed to prevent the transmission of malicious traffic between virtual machines hosted on a singular physical device on a network?


Options are :

  • NIPS on the network
  • HIPS on each virtual machine
  • HIDS on each virtual machine
  • NIDS on the network

Answer : HIPS on each virtual machine

Which of the following devices is MOST likely being used when processing the following?


Options are :

  • Firewall
  • NIPS
  • URL filter
  • Load balancer

Answer : Firewall

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 9

A review of the company’s network traffic shows that most of the malware infections are caused by users visiting gambling and gaming websites. The security manager wants to implement a solution that will block these websites, scan all web traffic for signs of malware, and block the malware before it enters the company network. Which of the following is suited for this purpose?


Options are :

  • Firewall
  • ACL
  • IDS
  • UTM

Answer : UTM

Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to one public IP address on the external interface of the same firewall. Which of the following should Sara configure?


Options are :

  • PAT
  • NAC
  • DNAT
  • NAP

Answer : PAT

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions