CompTIA Security+ Cert. (SY0-501): Practice Tests 2019 Set 1

Your organization recently implemented two servers that act as failover

devices for each other. Which security goal is your organization pursuing?



Options are :

  • D. Availability (Correct)
  • B. Integrity
  • C. Confidentiality
  • A. Obfuscation

Answer : D. Availability

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 3

A security expert at your organization is leading an on-site meeting with key disaster recovery personnel. The purpose of the meeting is to perform a test. Which of the following BEST describes this test?



Options are :

  • D. Simulation to perform steps of a plan
  • C. Tabletop exercise (Correct)
  • A. Functional exercise
  • B. Full-blown test

Answer : C. Tabletop exercise

Management at your organization is planning to hire a development firm to create a sophisticated web application. One of their primary goals is to ensure that personnel involved with the project frequently collaborate with each other throughout the project. Which of the following is an appropriate model for this project?



Options are :

  • D. Secure DevOps
  • B. SDLC
  • A. Waterfall
  • C. Agile (Correct)

Answer : C. Agile

Management has implemented a policy stating that messages sent between upper-level executives must arrive without any changes. The IT department is tasked with implementing technical controls to meet this need. Which security goal does this policy address?



Options are :

  • B. Integrity (Correct)
  • A. Confidentiality
  • C. Availability
  • D. Authentication

Answer : B. Integrity

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 2

Management wants to ensure that employees do not print any documents that include customer or employee PII. Which of the following solutions would meet this goal?



Options are :

  • C. VLAN
  • A. HSM
  • D. DLP (Correct)
  • B. TPM

Answer : D. DLP

Marge, a security administrator, is tasked with ensuring that all devices

have updated virus definition files before they can access network resources.

Which of the followingtechnologies would help her accomplish this goal?



Options are :

  • B. NAC (Correct)
  • A. NIDS
  • C. DLP
  • D. DMZ

Answer : B. NAC

Your organization recently purchased some laptops that include a TPM. Which of the following BEST identifies what the TPM provides?



Options are :

  • D. An external security device used to store cryptographic keys
  • B. A hardware root of trust (Correct)
  • A. Detection of unauthorized data transfers
  • C. Sandboxing

Answer : B. A hardware root of trust

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 1

Security analysts recently discovered that users in your organization are inadvertently installing malware on their systems after visiting the comptai.org web site. Users have a legitimate requirement to visit the comptia.org web site. Which of the following is the MOST likely explanation for this activity?



Options are :

  • C. Fuzzing
  • A. Smurf
  • D. Replay
  • B. Typo squatting (Correct)

Answer : B. Typo squatting

You are configuring a file server used to share files and folders among employees within your organization. However, employees should not be able to access all folders on this server. Which of the following choices is the BEST method to manage security for these folders?



Options are :

  • A. Assign permissions to each user as needed.
  • D. Use security groups with appropriate permissions. (Correct)
  • C. Delegate authority to assign these permissions.
  • B. Wait for users to request permission and then assign the appropriate permissions.

Answer : D. Use security groups with appropriate permissions.

The Retirement Castle uses groups for ease of administration and management. They recently hired Jasper as their new accountant. Jasper needs access to all the files and folders used by the Accounting department. Which of the following should the administrator do to give Jasper appropriate access?



Options are :

  • C. Create an account for Jasper and use rule-based access control for accounting.
  • A. Create an account for Jasper and add the account to the Accounting group. (Correct)
  • D. Create an account for Jasper and add the account to the Administrators group.
  • B. Give Jasper the password for the Guest account.

Answer : A. Create an account for Jasper and add the account to the Accounting group.

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

Homer noticed that several generators within the nuclear power plant have been turning on without user interaction. Security investigators discovered that an unauthorized file was installed, causing these generators to start at timed intervals. Further, they determined this file was installed during a visit by external engineers. What should Homer recommend to mitigate this threat in the future?



Options are :

  • B. Implement WPA2 Enterprise.
  • D. Configure the SCADA within a VLAN. (Correct)
  • A. Create an internal CA.
  • C. Implement patch management processes.

Answer : D. Configure the SCADA within a VLAN.

Your organization frequently has guests visiting in various

conference rooms throughout the building. These guests need access to the

Internet via the wireless network, but should not be able to access internal

network resources. Employees need access to both the internal network and

the Internet. Which of the following would BEST meet this need?



Options are :

  • C. VPN
  • D. 802.1x (Correct)
  • B. DMZ
  • A. NAT

Answer : D. 802.1x

You suspect someone has been trying a brute force password attack on a Linux system. Which of the following logs should you check to view failed authentication attempts by users?



Options are :

  • D. /var/log/kern
  • C. var/log/httpd
  • B. /var/log/fail
  • A. /var/log/btmp (Correct)

Answer : A. /var/log/btmp

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Your organization has recently rented access to computing resources via a cloud. Administrators within your organization apply patches to the operating system. Which of the following choices BEST describes this cloud deployment model?



Options are :

  • D. Hybrid
  • A. Community
  • C. Infrastructure as a Service (Correct)
  • B. Software as a Service

Answer : C. Infrastructure as a Service

An outside security auditor recently completed an in-depth security audit on your network. One of the issues he reported was related to passwords. Specifically, he found the following passwords used on the network: Pa$$, 1@W2, and G7bT3. Which of the following should be changed to avoid the problem shown with these passwords?



Options are :

  • B. Password length (Correct)
  • C. Password history
  • D. Password reuse
  • A. Password complexity

Answer : B. Password length

A penetration tester is tasked with gaining information on one of your internal servers and he enters the following command:

echo ďĒ | nc -vv -n -w1 72.52.206.134 80

What is the purpose of this command?



Options are :

  • D. Use Netcat to start an RDP session on the server.
  • A. Identify if a server is running a service using port 80 and is reachable. (Correct)
  • B. Launch an attack on a server sending 80 separate packets in a short period of time.
  • C. Use Netcat to remotely administer the server.

Answer : A. Identify if a server is running a service using port 80 and is reachable.

JK0-802 CompTIA A+ Certification Exam Set 9

The First Bank of Springfield has been experiencing widespread fraud recently. Attackers are transferring funds out of customer accounts to other banks. The bank began requiring customers to obtain credentials in person at the bank. However, this hasnít reduced the number of fraudulent transactions. After reviewing available logs, investigators determined that these fraudulent transactions are conducted with the customerís actual credentials. Which of the following security controls should be strengthened to reduce these incidents?



Options are :

  • B. Identification
  • A. Authentication (Correct)
  • D. Authorization
  • C. Accounting

Answer : A. Authentication

Lisa has created an application on her development computer. She wants to test it on a Linux-based computer she commonly uses for testing. However, she wants to ensure it is isolated when she tests it. Which of the following is the BEST solution to meet her needs?



Options are :

  • C. Use FDE.
  • B. Sideload the application.
  • A. Use chroot. (Correct)
  • D. Use chmod.

Answer : A. Use chroot.

Your local library is planning to purchase new computers that patrons can use for Internet research. Which of the following are the BEST choices to protect these computers? (Select TWO.)



Options are :

  • A. Mantrap
  • C. Disk encryption
  • B. Anti-malware software (Correct)

Answer : B. Anti-malware software

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 12

You want to test new security controls before deploying them. Which

of the following technologies provides the MOST flexibility to meet this goal?



Options are :

  • A. Baselines
  • C. Virtualization technologies (Correct)
  • B. Hardening techniques
  • D. Patch management programs

Answer : C. Virtualization technologies

Your organization is hosting a wireless network with an 802.1x server using PEAP. On Thursday, users report they can no longer access the wireless network, but they could access it on the previous day. Administrators verified the network configuration matches the baseline, there arenít any hardware outages, and the wired network is operational.

Which of the following is the MOST likely cause for this problem?



Options are :

  • B. DNS is providing incorrect host names.
  • A. The RADIUS server certificate expired. (Correct)
  • D. MAC filtering is enabled.
  • C. DHCP is issuing duplicate IP addresses.

Answer : A. The RADIUS server certificate expired.

Users in your organization have reported receiving a similar email from the same sender. The email included a link, but after recent training on emerging threats, all the users chose not to click the link. Security investigators determined the link was malicious and was designed to download ransomware. Which of the following BEST describes the email?



Options are :

  • A. Phishing
  • C. Spam
  • B. Spear phishing (Correct)
  • D. Vishing

Answer : B. Spear phishing

SK0-004 CompTIA Server+ Certification Practice Exam Set 5

Administrators have noticed a significant amount of OCSP traffic sent to an intermediate CA. They want to reduce this traffic. Which of the following is the BEST choice to meet this need?



Options are :

  • B. Digital signatures
  • D. Hashing
  • C. Stapling (Correct)
  • A. Pinning

Answer : C. Stapling

An attacker recently attacked a web server hosted by your company. After investigation, security professionals determined that the attacker used a previously unknown application exploit. Which of the following BEST identifies this attack?



Options are :

  • A. Buffer overflow
  • C. Man-in-the-browser
  • B. Zero-day attack (Correct)
  • D. Session hijacking

Answer : B. Zero-day attack

You suspect that an attacker has been sending specially crafted TCP packets to a server trying to exploit a vulnerability. You decide to capture TCP packets being sent to this server for later analysis and you want to use a command-line tool to do so. Which of the following tools will BEST meet your need?



Options are :

  • B. Tcpdump (Correct)
  • A. Wiredump
  • D. Nmap
  • C. Netcat

Answer : B. Tcpdump

HT0-201 CEA- CompTIA DHTI+ Certification Practice Exam Set 6

Bart wants to send a secure email to Lisa, so he decides to encrypt it. He wants to ensure that only Lisa can decrypt it. Which of the following does Lisa need to decrypt Bartís email?



Options are :

  • C. Lisaís public key
  • B. Bartís private key
  • D. Lisaís private key (Correct)
  • A. Bartís public key

Answer : D. Lisaís private key

Your organization is planning to establish a secure link between one of

your mail servers and a business partnerís mail server. The connection will

use the Internet. Which protocol is the BEST choice?



Options are :

  • A. TLS (Correct)
  • D. SSH
  • B. SMTP
  • C. HTTP

Answer : A. TLS

Management asks you if you can modify the wireless network to

prevent users from easily discovering it. Which of the following would you

modify to meet this goal?



Options are :

  • B. WPA2 Enterprise
  • A. CCMP
  • D. MAC address filter
  • C. SSID broadcast (Correct)

Answer : C. SSID broadcast

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 2

You need to send several large files containing proprietary data to a

business partner. Which of the following is the BEST choice for this task?



Options are :

  • A. FTP
  • C. SFTP (Correct)
  • B. SNMPv3
  • D. SRTP

Answer : C. SFTP

A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed concern that unauthorized personnel might be able to access data on the server. The security administrator decided to check the server further. Of the following choices, what is the administrator MOST likely looking for on this server?



Options are :

  • B. Logic bomb
  • C. Rootkit
  • A. Backdoor (Correct)
  • D. Botnet

Answer : A. Backdoor

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions