CompTIA JK0-022 E2C Security+ Threats & Vulnerabilities Exam Set 1

Which of the following tools would a security administrator use in order to identify all running services throughout an organization?


Options are :

  • Architectural review
  • Design review
  • Penetration test
  • Port scanner (Correct)

Answer : Port scanner

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 5

A new security analyst is given the task of determining whether any of the company?s servers are vulnerable to a recently discovered attack on an old version of SSH. Which of the following is the quickest FIRST step toward determining the version of SSH running on these servers?


Options are :

  • Passive scanning
  • Penetration testing
  • Banner grabbing (Correct)
  • Protocol analysis

Answer : Banner grabbing

Joe, an administrator, installs a web server on the Internet that performs credit card transactions for customer payments. Joe also sets up a second web server that looks like the first web server. However, the second server contains fabricated files and folders made to look like payments were processed on this server but really were not. Which of the following is the second server?


Options are :

  • DMZ
  • Honeynet
  • VLAN
  • Honeypot (Correct)

Answer : Honeypot

Which of the following is BEST utilized to actively test security controls on a particular system?


Options are :

  • Vulnerability scanning
  • Port scanning
  • Grey/Gray box
  • Penetration test (Correct)

Answer : Penetration test

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 21

Which of the following tools would allow Ann, the security administrator, to be able to BEST quantify all traffic on her network?


Options are :

  • Vulnerability scanner
  • Port scanner
  • Honeypot
  • Protocol analyzer (Correct)

Answer : Protocol analyzer

After analyzing and correlating activity from multiple sensors, the security administrator has determined that a group of very well organized individuals from an enemy country is responsible for various attempts to breach the company network, through the use of very sophisticated and targeted attacks. Which of the following is this an example of?


Options are :

  • Advanced persistent threat (Correct)
  • Malicious insider threat
  • Privilege escalation
  • Spear phishing

Answer : Advanced persistent threat

Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company?s live modem pool. Which of the following activities is MOST appropriate?


Options are :

  • War driving
  • Bluesnarfing
  • War dialing (Correct)
  • War chalking

Answer : War dialing

CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 1

The security team would like to gather intelligence about the types of attacks being launched against the organization. Which of the following would provide them with the MOST information?


Options are :

  • Perform a penetration test
  • Deploy an IDS
  • Implement a honeynet (Correct)
  • Examine firewall logs

Answer : Implement a honeynet

During an anonymous penetration test, Jane, a system administrator, was able to identify a shared print spool directory, and was able to download a document from the spool. Which statement BEST describes her privileges?


Options are :

  • All users have write access to the directory.
  • Jane has read access to the file.
  • All users have read access to the file (Correct)
  • Jane has read access to the directory

Answer : All users have read access to the file

Which of the following would a security administrator implement in order to identify a problem between two applications that are not communicating properly?


Options are :

  • Baseline report
  • Protocol analyzer (Correct)
  • Risk assessment
  • Vulnerability scan

Answer : Protocol analyzer

CompTIA CA1-001 Advanced Security Practitioner Practice Exam Set 4

Sara, the Chief Information Officer (CIO), has requested an audit take place to determine what services and operating systems are running on the corporate network. Which of the following should be used to complete this task?


Options are :

  • Fuzzing and a port scan
  • Fingerprinting and password crackers
  • Vulnerability scan and fuzzing
  • Port scan and fingerprinting (Correct)

Answer : Port scan and fingerprinting

Ann, a security analyst, is preparing for an upcoming security audit. To ensure that she identifies unapplied security controls and patches without attacking or compromising the system, Ann would use which of the following?


Options are :

  • Vulnerability scanning (Correct)
  • Antivirus update
  • SQL injection
  • Penetration testing

Answer : Vulnerability scanning

Which device monitors network traffic in a passive manner?


Options are :

  • Web browser
  • Sniffer (Correct)
  • Firewall
  • IDS

Answer : Sniffer

220-702 CompTIA A+ Practical Application Practice Exam Set 4

Which of the following would a security administrator implement in order to discover comprehensive security threats on a network?


Options are :

  • Baseline reporting
  • Vulnerability scan (Correct)
  • Code review
  • Design reviews

Answer : Vulnerability scan

A security administrator is aware that a portion of the company?s Internet-facing network tends to be non-secure due to poorly configured and patched systems. The business owner has accepted the risk of those systems being compromised, but the administrator wants to determine the degree to which those systems can be used to gain access to the company intranet. Which of the following should the administrator perform?


Options are :

  • Business impact assessment
  • Vulnerability assessment
  • Penetration test (Correct)
  • Patch management assessment

Answer : Penetration test

Ann, the software security engineer, works for a major software vendor. Which of the following practices should be implemented to help prevent race conditions, buffer overflows, and other similar vulnerabilities prior to each production release?


Options are :

  • Code review (Correct)
  • Input validation
  • Patch regression testing
  • Product baseline report

Answer : Code review

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

Which of the following should an administrator implement to research current attack methodologies?


Options are :

  • Vulnerability scanner
  • Honeypot (Correct)
  • Code reviews
  • Design reviews

Answer : Honeypot

Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?


Options are :

  • Vulnerability scan (Correct)
  • Brute Force scan
  • Penetration test
  • Code review

Answer : Vulnerability scan

What is a system that is intended or designed to be broken into by an attacker?


Options are :

  • Spoofing system
  • Honeybucket
  • Decoy
  • Honeypot (Correct)

Answer : Honeypot

Ethical Hacking and CompTIA PenTest+ with 2 Practice Tests Set 2

One of the servers on the network stops responding due to lack of available memory. Server administrators did not have a clear definition of what action should have taken place based on the available memory. Which of the following would have BEST kept this incident from occurring?


Options are :

  • Review the performance monitor on a monthly basis
  • Review the systems monitor on a monthly basis
  • Set up a performance baseline (Correct)
  • Set up a protocol analyzer

Answer : Set up a performance baseline

A security specialist has been asked to evaluate a corporate network by performing a vulnerability assessment. Which of the following will MOST likely be performed?


Options are :

  • Verify vulnerabilities exist, bypass security controls and exploit the vulnerabilities.
  • Identify vulnerabilities, check applicability of vulnerabilities by passively testing security controls. (Correct)
  • Exploit security controls to determine vulnerabilities and misconfigurations.
  • Bypass security controls and identify applicability of vulnerabilities by passively testing security controls.

Answer : Identify vulnerabilities, check applicability of vulnerabilities by passively testing security controls.

Which of the following is BEST used to capture and analyze network traffic between hosts on the same network segment?


Options are :

  • Router
  • Protocol analyzer (Correct)
  • HIPS
  • Firewall

Answer : Protocol analyzer

220-801 CompTIA A+ Certification Practice Exam Set 9

Joe, the security administrator, has determined that one of his web servers is under attack. Which of the following can help determine where the attack originated from?


Options are :

  • Capture system image
  • Screenshots
  • Record time offset
  • Network sniffing (Correct)

Answer : Network sniffing

Which of the following assessments would Pete, the security administrator, use to actively test that an application?s security controls are in place?


Options are :

  • Code review
  • Vulnerability scan
  • Penetration test (Correct)
  • Protocol analyzer

Answer : Penetration test

During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR).


Options are :

  • SSH (Correct)
  • 23 (Correct)
  • 30
  • Telnet (Correct)
  • 22 (Correct)
  • 21

Answer : SSH 23 Telnet 22

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 9

Which of the following security architecture elements also has sniffer functionality? (Select TWO).


Options are :

  • IDS (Correct)
  • HSM
  • IPS (Correct)
  • WAP
  • SSL accelerator

Answer : IDS IPS

During a security assessment, an administrator wishes to see which services are running on a remote server. Which of the following should the administrator use?


Options are :

  • Process list
  • Protocol analyzer
  • Port scanner (Correct)
  • Network sniffer

Answer : Port scanner

Which of the following would a security administrator implement in order to identify a problem between two systems that are not communicating properly?


Options are :

  • Baseline report
  • Protocol analyzer (Correct)
  • Vulnerability scan
  • Risk assessment

Answer : Protocol analyzer

SY0-401 CompTIA Security+ Certification Practice Exam Set 2

A system administrator has noticed vulnerability on a high impact production server. A recent update was made available by the vendor that addresses the vulnerability but requires a reboot of the system afterwards. Which of the following steps should the system administrator implement to address the vulnerability?


Options are :

  • Test the update in a lab environment, schedule downtime to install the patch, install the patch and reboot the server and monitor for any changes
  • Test the update in a lab environment, backup the server, schedule downtime to install the patch, install the update, reboot the server, and monitor for any changes (Correct)
  • Backup the server, schedule downtime to install the patch, installs the patch and monitor for any changes
  • Test the update in a lab environment, backup the server, schedule downtime to install the patch, install the patch, and monitor for any changes

Answer : Test the update in a lab environment, backup the server, schedule downtime to install the patch, install the update, reboot the server, and monitor for any changes

Which of the following BEST allows Pete, a security administrator, to determine the type, source, and flags of the packet traversing a network for troubleshooting purposes?


Options are :

  • Routers
  • Web security gateways
  • Switches
  • Protocol analyzers (Correct)

Answer : Protocol analyzers

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions