CompTIA JK0-022 E2C Security+ Threats & Vulnerabilities Exam Set 5

Joe, an administrator, installs a web server on the Internet that performs credit card transactions for customer payments. Joe also sets up a second web server that looks like the first web server. However, the second server contains fabricated files and folders made to look like payments were processed on this server but really were not. Which of the following is the second server?


Options are :

  • VLAN
  • Honeynet
  • Honeypot (Correct)
  • DMZ

Answer : Honeypot

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

After analyzing and correlating activity from multiple sensors, the security administrator has determined that a group of very well organized individuals from an enemy country is responsible for various attempts to breach the company network, through the use of very sophisticated and targeted attacks. Which of the following is this an example of?


Options are :

  • Privilege escalation
  • Malicious insider threat
  • Spear phishing
  • Advanced persistent threat (Correct)

Answer : Advanced persistent threat

A security administrator is aware that a portion of the company?s Internet-facing network tends to be non-secure due to poorly configured and patched systems. The business owner has accepted the risk of those systems being compromised, but the administrator wants to determine the degree to which those systems can be used to gain access to the company intranet. Which of the following should the administrator perform?


Options are :

  • Penetration test (Correct)
  • Patch management assessment
  • Business impact assessment
  • Vulnerability assessment

Answer : Penetration test

The security team would like to gather intelligence about the types of attacks being launched against the organization. Which of the following would provide them with the MOST information?


Options are :

  • Perform a penetration test
  • Deploy an IDS
  • Examine firewall logs
  • Implement a honeynet (Correct)

Answer : Implement a honeynet

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 12

Which of the following would a security administrator implement in order to identify change from the standard configuration on a server?


Options are :

  • Code review
  • Design review
  • Penetration test
  • Baseline review (Correct)

Answer : Baseline review

One of the servers on the network stops responding due to lack of available memory. Server administrators did not have a clear definition of what action should have taken place based on the available memory. Which of the following would have BEST kept this incident from occurring?


Options are :

  • Review the systems monitor on a monthly basis
  • Review the performance monitor on a monthly basis
  • Set up a performance baseline (Correct)
  • Set up a protocol analyzer

Answer : Set up a performance baseline

Which of the following tools would allow Ann, the security administrator, to be able to BEST quantify all traffic on her network?


Options are :

  • Port scanner
  • Protocol analyzer (Correct)
  • Vulnerability scanner
  • Honeypot

Answer : Protocol analyzer

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 11

Which of the following BEST allows Pete, a security administrator, to determine the type, source, and flags of the packet traversing a network for troubleshooting purposes?


Options are :

  • Protocol analyzers (Correct)
  • Switches
  • Web security gateways
  • Routers

Answer : Protocol analyzers

A financial company requires a new private network link with a business partner to cater for realtime and batched data flows. Which of the following activities should be performed by the IT security staff member prior to establishing the link?


Options are :

  • Code review
  • Baseline reporting
  • SLA reporting
  • Design review (Correct)

Answer : Design review

Which of the following assessments would Pete, the security administrator, use to actively test that an application?s security controls are in place?


Options are :

  • Vulnerability scan
  • Code review
  • Protocol analyzer
  • Penetration test (Correct)

Answer : Penetration test

CompTIA SY0-401 Security Certification Practice Exam Set 1

Ann, the software security engineer, works for a major software vendor. Which of the following practices should be implemented to help prevent race conditions, buffer overflows, and other similar vulnerabilities prior to each production release?


Options are :

  • Patch regression testing
  • Code review (Correct)
  • Input validation
  • Product baseline report

Answer : Code review

Which of the following is the MOST intrusive type of testing against a production system?


Options are :

  • War dialing
  • Vulnerability testing
  • Penetration testing (Correct)
  • White box testing

Answer : Penetration testing

Based on information leaked to industry websites, business management is concerned that unauthorized employees are accessing critical project information for a major, wellknown new product. To identify any such users, the security administrator could:


Options are :

  • Apply security updates and harden the OS on all project servers.
  • Set up a honeypot and place false project documentation on an unsecure share (Correct)
  • Increase antivirus coverage of the project servers
  • Block access to the project documentation using a firewall

Answer : Set up a honeypot and place false project documentation on an unsecure share

220-902 CompTIA A+ Certification Practice Exam Set 4

Which of the following tools would a security administrator use in order to identify all running services throughout an organization?


Options are :

  • Architectural review
  • Design review
  • Port scanner (Correct)
  • Penetration test

Answer : Port scanner

During a penetration test from the Internet, Jane, the system administrator, was able to establish a connection to an internal router, but not successfully log in to it. Which ports and protocols are MOST likely to be open on the firewall? (Select FOUR).


Options are :

  • SSH (Correct)
  • 22 (Correct)
  • 23 (Correct)
  • 30
  • 21
  • Telnet (Correct)

Answer : SSH 22 23 Telnet

Which of the following is BEST utilized to actively test security controls on a particular system?


Options are :

  • Port scanning
  • Vulnerability scanning
  • Grey/Gray box
  • Penetration test (Correct)

Answer : Penetration test

CD0-001 CDIA+ Certification Practice Exam Set 2

Which of the following security architecture elements also has sniffer functionality? (Select TWO).


Options are :

  • WAP
  • HSM
  • IPS (Correct)
  • SSL accelerator
  • IDS (Correct)

Answer : IPS IDS

Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?


Options are :

  • Audit logs
  • Honeypot (Correct)
  • Protocol analyzer
  • Security logs

Answer : Honeypot

Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?


Options are :

  • Penetration test
  • Brute Force scan
  • Vulnerability scan (Correct)
  • Code review

Answer : Vulnerability scan

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

Which of the following is BEST used to capture and analyze network traffic between hosts on the same network segment?


Options are :

  • Firewall
  • Protocol analyzer (Correct)
  • Router
  • HIPS

Answer : Protocol analyzer

A new security analyst is given the task of determining whether any of the company?s servers are vulnerable to a recently discovered attack on an old version of SSH. Which of the following is the quickest FIRST step toward determining the version of SSH running on these servers?


Options are :

  • Penetration testing
  • Banner grabbing (Correct)
  • Passive scanning
  • Protocol analysis

Answer : Banner grabbing

What is a system that is intended or designed to be broken into by an attacker?


Options are :

  • Decoy
  • Spoofing system
  • Honeybucket
  • Honeypot (Correct)

Answer : Honeypot

CompTIA Security+ Cert. (SY0-501): Practice Tests 2019 Set 1

Which of the following should an administrator implement to research current attack methodologies?


Options are :

  • Design reviews
  • Vulnerability scanner
  • Honeypot (Correct)
  • Code reviews

Answer : Honeypot

Which device monitors network traffic in a passive manner?


Options are :

  • IDS
  • Firewall
  • Web browser
  • Sniffer (Correct)

Answer : Sniffer

Ann, a security analyst, is preparing for an upcoming security audit. To ensure that she identifies unapplied security controls and patches without attacking or compromising the system, Ann would use which of the following?


Options are :

  • Vulnerability scanning (Correct)
  • Penetration testing
  • Antivirus update
  • SQL injection

Answer : Vulnerability scanning

CompTIA Advanced Security Practitioner(CASP+) Practice Exams Set 2

Which of the following would a security administrator implement in order to identify a problem between two systems that are not communicating properly?


Options are :

  • Risk assessment
  • Baseline report
  • Vulnerability scan
  • Protocol analyzer (Correct)

Answer : Protocol analyzer

Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane?s company?


Options are :

  • Port scanner
  • Vulnerability scanner
  • Protocol analyzer
  • Honeynet (Correct)

Answer : Honeynet

During an anonymous penetration test, Jane, a system administrator, was able to identify a shared print spool directory, and was able to download a document from the spool. Which statement BEST describes her privileges?


Options are :

  • All users have write access to the directory.
  • Jane has read access to the directory
  • Jane has read access to the file.
  • All users have read access to the file (Correct)

Answer : All users have read access to the file

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 9

Which of the following would a security administrator implement in order to discover comprehensive security threats on a network?


Options are :

  • Vulnerability scan (Correct)
  • Design reviews
  • Code review
  • Baseline reporting

Answer : Vulnerability scan

Which of the following assessment techniques would a security administrator implement to ensure that systems and software are developed properly?


Options are :

  • Input validation
  • Design reviews (Correct)
  • Baseline reporting
  • Determine attack surface

Answer : Design reviews

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions