CompTIA JK0-022 Security Cryptography Certification Exam Set 2

Ann, the system administrator, is installing an extremely critical system that can support ZERO downtime. Which of the following BEST describes the type of system Ann is installing?


Options are :

  • Clustered
  • Load balanced
  • High availability (Correct)
  • RAID

Answer : High availability

JK0-802 CompTIA A+ Certification Exam Set 9

A security administrator is tasked with ensuring that all devices have updated virus definition files before they are allowed to access network resources. Which of the following technologies would be used to accomplish this goal?


Options are :

  • Port Security
  • NIDS
  • DMZ
  • DLP
  • NAC (Correct)

Answer : NAC

Visible security cameras are considered to be which of the following types of security controls?


Options are :

  • Administrative
  • Compensating
  • Technical
  • Deterrent (Correct)

Answer : Deterrent

Which of the following is a security advantage of using NoSQL vs. SQL databases in a three-tier environment?


Options are :

  • NoSQL databases are not vulnerable to SQL injection attacks. (Correct)
  • NoSQL databases perform faster than SQL databases on the same hardware.
  • NoSQL databases encrypt sensitive information by default.
  • NoSQL databases are not vulnerable to XSRF attacks from the application server.

Answer : NoSQL databases are not vulnerable to SQL injection attacks.

JK0-802 CompTIA A+ Certification Exam Set 3

Which of the following solutions provides the most flexibility when testing new security controls prior to implementation?


Options are :

  • Host software baselining
  • Trusted OS
  • Virtualization (Correct)
  • OS hardening

Answer : Virtualization

Encryption used by RADIUS is BEST described as:


Options are :

  • Elliptical curve
  • Symmetric (Correct)
  • Quantum
  • Asymmetric

Answer : Symmetric

A system administrator wants to confidentially send a user name and password list to an individual outside the company without the information being detected by security controls. Which of the following would BEST meet this security goal?


Options are :

  • Full-disk encryption
  • Steganography (Correct)
  • Digital signatures
  • Hashing

Answer : Steganography

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 5

A company plans to expand by hiring new engineers who work in highly specialized areas. Each engineer will have very different job requirements and use unique tools and applications in their job. Which of the following is MOST appropriate to use?


Options are :

  • User assigned privileges
  • User access
  • Credential management
  • Role-based privileges (Correct)

Answer : Role-based privileges

Joe must send Ann a message and provide Ann with assurance that he was the actual sender. Which of the following will Joe need to use to BEST accomplish the objective?


Options are :

  • His public key
  • Ann's public key
  • His private key (Correct)
  • A pre-shared private key

Answer : His private key

Which of the following is true about asymmetric encryption?


Options are :

  • A message encrypted with the public key can be decrypted with the private key (Correct)
  • A message encrypted with a shared key, can be decrypted by the same key.
  • A message encrypted with the private key can be decrypted by the same key
  • A message encrypted with the public key can be decrypted with a shared key.

Answer : A message encrypted with the public key can be decrypted with the private key

SY0-401 CompTIA Security+ Certification Practice Exam Set 8

An internal audit has detected that a number of archived tapes are missing from secured storage. There was no recent need for restoration of data from the missing tapes. The location is monitored by access control and CCTV systems. Review of the CCTV system indicates that it has not been recording for three months. The access control system shows numerous valid entries into the storage location during that time. The last audit was six months ago and the tapes were accounted for at that time. Which of the following could have aided the investigation?


Options are :

  • Risk assessment
  • Routine audits
  • Signed AUP
  • Testing controls (Correct)

Answer : Testing controls

The call center supervisor has reported that many employees have been playing preinstalled games on company computers and this is reducing productivity. Which of the following would be MOST effective for preventing this behavior?


Options are :

  • Application whitelisting (Correct)
  • Acceptable use policies
  • Host-based firewalls
  • Content inspection

Answer : Application whitelisting

Verifying the integrity of data submitted to a computer program at or during run-time, with the intent of preventing the malicious exploitation of unintentional effects in the structure of the code, is BEST described as which of the following?


Options are :

  • Application hardening
  • Output sanitization
  • Input validation (Correct)
  • Fuzzing

Answer : Input validation

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 4

A company uses PGP to ensure that sensitive email is protected. Which of the following types of cryptography is being used here for the key exchange?


Options are :

  • Symmetric (Correct)
  • Session-based
  • Asymmetric
  • Hashing

Answer : Symmetric

A file on a Linux server has default permissions of rw-rw-r--. The system administrator has verified that Ann, a user, is not a member of the group owner of the file. Which of the following should be modified to assure that Ann has read access to the file?


Options are :

  • The file system access control list (FACL) for the file in question (Correct)
  • Directory permissions on the parent directory of the file in question
  • User ownership information for the file in question
  • Group memberships for the group owner of the file in question

Answer : The file system access control list (FACL) for the file in question

A server is configured to communicate on both VLAN 1 and VLAN 12. VLAN 1 communication works fine, but VLAN 12 does not. Which of the following MUST happen before the server can communicate on VLAN 12?


Options are :

  • The server's network switch port must be 802.1q untagged for VLAN 12.
  • The server's network switch port must use VLAN Q-in-Q for VLAN 12.
  • The server's network switch port must be enabled for 802.11x on VLAN 12.
  • The server's network switch port must be 802.1q tagged for VLAN 12 (Correct)

Answer : The server's network switch port must be 802.1q tagged for VLAN 12

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 7

A security administrator would like to ensure that system administrators are not using the same password for both their privileged and non-privileged accounts. Which of the following security controls BEST accomplishes this goal?


Options are :

  • Require shorter password expiration for non-privileged accounts
  • Require different account passwords through a policy (Correct)
  • Require shorter password expiration for privileged accounts
  • Require a greater password length for privileged accounts

Answer : Require different account passwords through a policy

An active directory setting restricts querying to only secure connections. Which of the following ports should be selected to establish a successful connection?


Options are :

  • 389
  • 636 (Correct)
  • 440
  • 3286

Answer : 636

A company's Chief Information Officer realizes the company cannot continue to operate after a disaster. Which of the following describes the disaster?


Options are :

  • Vulnerability
  • Asset
  • Threat (Correct)
  • Risk

Answer : Threat

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 17

A company has just deployed a centralized event log storage system. Which of the following can be used to ensure the integrity of the logs after they are collected?


Options are :

  • Role-based access controls
  • Continuous monitoring
  • Write-once drives (Correct)
  • Database encryption

Answer : Write-once drives

The IT department has installed new wireless access points but discovers that the signal extends far into the parking lot. Which of the following actions should be taken to correct this?


Options are :

  • Disable the SSID broadcasting
  • Configure the access points so that MAC filtering is not used
  • Implement WEP encryption on the access points
  • Lower the power for office coverage only (Correct)

Answer : Lower the power for office coverage only

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 10

A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected?


Options are :

  • CRC
  • Stream cipher
  • Hashing algorithm
  • Block cipher (Correct)

Answer : Block cipher

In order to securely communicate using PGP, the sender of an email must do which of the following when sending an email to a recipient for the first time?


Options are :

  • Export the senderís public key
  • Export the senderís private key
  • Import the recipientís private key
  • Import the recipientís public key (Correct)

Answer : Import the recipientís public key

A security technician is attempting to access a wireless network protected with WEP. The technician does not know any information about the network. Which of the following should the technician do to gather information about the configuration of the wireless network?


Options are :

  • Capture client to access point disassociation packets to replay on the local PCís loopback
  • Spoof the MAC address of an observed wireless network client (Correct)
  • Ping the access point to discover the SSID of the network
  • Perform a dictionary attack on the access point to enumerate the WEP key

Answer : Spoof the MAC address of an observed wireless network client

N10-006 CompTIA Network+ Certification Practice Test Set 4

A security analyst discovered data such as images and word documents hidden within different types of files. Which of the following cryptographic concepts describes what was discovered?


Options are :

  • Symmetric encryption
  • Non-repudiation
  • Steganography (Correct)
  • Hashing

Answer : Steganography

Digital Signatures provide which of the following?


Options are :

  • Confidentiality
  • Authentication
  • Authorization
  • Availability
  • Integrity (Correct)

Answer : Integrity

Which of the following concepts is used by digital signatures to ensure integrity of the data?


Options are :

  • Transport encryption
  • Key escrow
  • Non-repudiation
  • Hashing (Correct)

Answer : Hashing

JK0-802 CompTIA A+ Certification Exam Set 5

Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level of encryption strength with a lower key length than is typically necessary. Which of the following encryption methods offers this capability?


Options are :

  • RSA
  • ECC (Correct)
  • Twofish
  • Diffie-Hellman

Answer : ECC

A network stream needs to be encrypted. Sara, the network administrator, has selected a cipher which will encrypt 8 bits at a time before sending the data across the network. Which of the following has Sara selected?


Options are :

  • Stream cipher
  • Block cipher (Correct)
  • Hashing algorithm
  • CRC

Answer : Block cipher

All of the following are valid cryptographic hash functions EXCEPT:


Options are :

  • RC4 (Correct)
  • MD4.
  • SHA-512.
  • RIPEMD.

Answer : RC4

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions