CompTIA Security+ Cert. (SY0-501) Practice Tests Set 5

Which of the following simple command-line tools would be used from the host to determine what open ports a host is listening on?


Options are :

  • ping
  • ifconfig
  • nbtstat
  • netstat

Answer :netstat

Which of the following terms is defined as something that can cause harm to an asset?


Options are :

  • Loss
  • Vulnerability
  • Risk
  • Threat

Answer :Threat

N10-006 CompTIA Network+ Certification Practice Test Set 6

Which of the following devices is intentionally left nonsecure, with the hopes of luring a hacker away from the network and observing them?


Options are :

  • IDS
  • Honeypot
  • IPS
  • Bastion host

Answer :Honeypot

A printed e-mail would be considered which kind of evidence?


Options are :

  • Demonstrative evidence
  • Direct evidence
  • Documentary evidence
  • Real evidence

Answer :Documentary evidence

All of the following are considered secure password creation practices EXCEPT:


Options are :

  • Passwords must include the userid.
  • Passwords must not use common dictionary-based words.
  • Passwords must be of sufficient length.
  • Passwords must use a mixture of uppercase, lowercase, numbers, and special characters.

Answer :Passwords must include the userid.

CL0-001 CompTIA Cloud Essentials Practice Test Set 4

You are troubleshooting a communication problem with an application that sends data to a remote system. What tool can you use to view the traffic being sent on the network by the application?


Options are :

  • Switch monitor
  • Spectrum analyzer
  • Frequency analyzer
  • Protocol analyzer

Answer :Protocol analyzer

Which of the following choices concerns itself with ensuring that data is not modified or destroyed while in storage or transit?


Options are :

  • Availability
  • Confidentiality
  • Integrity
  • Nonrepudiation

Answer :Integrity

Susan has received an e-mail message from her brother stating that if she forwards the e-mail to 10 different people that she will receive good fortune over the next three years. Susan forwards the e-mail. What policy has Susan violated in this example?


Options are :

  • Least privilege policy
  • Social engineering policy
  • Need-to-know policy
  • Acceptable usage policy

Answer :Acceptable usage policy

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 8

Your manager has read a lot about server virtualization and is wondering if there are any security benefits to using server virtualization. How would you respond?


Options are :

  • Fewer systems to physically secure
  • Larger hardware footprint
  • Decentralized server security
  • More work required to harden systems

Answer :Fewer systems to physically secure

Administrators who grant access to resources by placing users in groups are using which type of access control model?


Options are :

  • Discretionary access control
  • Rule-based access control
  • Role-based access control
  • Mandatory access control

Answer :Role-based access control

All of the following are valid 5.0 Risk Management strategies EXCEPT:


Options are :

  • Risk transference
  • Risk acceptance
  • Risk elimination
  • Risk mitigation

Answer :Risk elimination

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 3

Which of the following describes the best security practice to use when granting users elevated or administrative privileges?


Options are :

  • Users should have a normal user account for routine tasks, and an administrative account for tasks that require higher privileges.
  • Users who perform administrative-level tasks should be given the Domain Administrator user account name and password.
  • Administrative privileges should be granted directly to those user accounts that perform administrative-level tasks.
  • Users who require higher privileges should be placed in the Administrators group.

Answer :Users should have a normal user account for routine tasks, and an administrative account for tasks that require higher privileges.

Which of the following protocols uses IPSec to ensure confidentiality?


Options are :

  • L2TP
  • SSL
  • PPTP
  • PPP

Answer :L2TP

Which of the following statements are correct with regard to the concepts of fail-secure and fail-safe? (Choose two.)


Options are :

  • A fail-secure device responds by making sure the device is using a secure state when a failure occurs.
  • A fail-safe device responds by making sure the device is using a secure state when a failure occurs.
  • A fail-safe device responds by not doing anything to cause harm when the failure occurs.
  • A fail-secure device responds by not doing anything to cause harm when the failure occurs.

Answer :A fail-secure device responds by making sure the device is using a secure state when a failure occurs. A fail-safe device responds by not doing anything to cause harm when the failure occurs.

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 2

All of the following are considered secure application development practices EXCEPT:


Options are :

  • Back doors
  • Input validation
  • Memory management
  • Error and exception handling

Answer :Back doors

Which of the following are considered symmetric encryption algorithms? (Choose two.)


Options are :

  • MD5
  • RSA
  • SHA
  • 3DES
  • AES

Answer :3DES AES

Which of the following disaster recovery technologies is used to help protect you from failures related to a hard disk?


Options are :

  • Striping without parity
  • Network load balancing
  • RAID
  • Clustering

Answer :RAID

220-801 CompTIA A+ Certification Practice Exam Set 1

An example of the risk mitigation strategy that involves transferring risk to another entity would be:


Options are :

  • Insurance
  • Alternate site
  • Service-level agreement
  • Separation of duties

Answer :Insurance

Which of the following terms refers to the practices of stealing or obtaining a user?s personal or account information, typically using voice over IP (VoIP) systems?


Options are :

  • Whaling
  • Phishing
  • VoIP hijacking
  • Vishing

Answer :Vishing

All of the following are types of penetration testing EXCEPT:


Options are :

  • White box
  • Gray box
  • Black box
  • Blue box

Answer :Blue box

CompTIA CySA+ Set 1

Which of the following attacks seeks to introduce erroneous or malicious entries into a server?s hostname-to-IP address cache or zone file?


Options are :

  • DHCP poisoning
  • ARP poisoning
  • DNS poisoning
  • Session hijacking

Answer :DNS poisoning

Which of the following attacks is NOT typically attempted by a rogue access point on a wireless network?


Options are :

  • Brute force
  • Evil twin
  • Interference
  • Spoofing

Answer :Brute force

Which of the following steps is the first to be accomplished during a penetration test?


Options are :

  • Privilege escalation
  • Port scanning
  • Obtain permission for the test
  • Password cracking

Answer :Obtain permission for the test

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 1

Bob logs on to the network and receives a message indicating that patches are not up to date and that he cannot be granted access to the network until patches are updated. What network feature is responsible for the message?


Options are :

  • TPM
  • NAC
  • VPN
  • NAT

Answer :NAC

Which of the following application attacks allows attackers to inject client-side script into web pages viewed by other users?


Options are :

  • XML injection
  • SQL injection
  • Buffer overflow
  • Cross-site scripting

Answer :Cross-site scripting

Which of the following statements bests describes a Trusted Platform Module?


Options are :

  • A secure logon module
  • A hardware module that performs cryptographic functions
  • A code module that performs authentication
  • A software module that prevents application attacks

Answer :A hardware module that performs cryptographic functions

CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 2

Your manager is interested in implementing a strong authentication scheme. Which of the following is considered the strongest authentication?


Options are :

  • Iris scan
  • PIN
  • Username/password
  • Fingerprint

Answer :Iris scan

A ?deny any-any? rule in a firewall ruleset is normally placed:


Options are :

  • At the top of the ruleset.
  • Below the last allow rule, but above the first deny rule in the ruleset.
  • Nowhere in the ruleset if it has a default allow policy.
  • At the bottom of the ruleset.

Answer :At the bottom of the ruleset.

Your company has a salesperson who travels a lot and will be connecting to hotel networks. What security recommendation would you make for her laptop?


Options are :

  • Host-based firewall
  • FDE
  • Unencrypted drive
  • Null password

Answer :Host-based firewall

SY0-401 CompTIA Security+ Certification Practice Exam Set 3

When a user types his or her username into a logon screen, this is known as ___________?


Options are :

  • Authorization
  • Identification
  • Authentication
  • Impersonation

Answer :Identification

Which of the following techniques involves sending unexpected or invalid data to an application to determine vulnerabilities?


Options are :

  • Scanning
  • Fuzzing
  • Cracking
  • Spoofing

Answer :Fuzzing

Which of the following algorithms is the stronger hashing algorithm?


Options are :

  • AES-256
  • 3DES
  • SHA-1
  • MD5

Answer :SHA-1

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 9

The hacker has managed to modify the cache on the system that stores the IP address and corresponding MAC address with inappropriate entries. What type of attack has occurred?


Options are :

  • ARP poisoning
  • DHCP poisoning
  • VLAN poisoning
  • DNS poisoning

Answer :ARP poisoning

Which of the following is typically conducted as a first step in the overall business continuity/disaster recovery strategy?


Options are :

  • Disaster recovery plan
  • Business impact analysis
  • System backup plan
  • Business continuity plan

Answer :Business impact analysis

Which of the following best describes a minimum password age setting?


Options are :

  • Passwords cannot be reused until they have been expired a certain amount of time.
  • Users must change passwords after a certain amount of time.
  • Users must wait a certain amount of time before they are allowed to change passwords.
  • Users must not change passwords until a certain date.

Answer :Users must wait a certain amount of time before they are allowed to change passwords.

CompTIA 220-801 A+ Advanced Certification Practice Exam Set 5

Which of the following types of malware is designed to activate after a predetermined amount of time or upon a specific event or date?


Options are :

  • Logic bomb
  • Adware
  • Trojan
  • Rootkit

Answer :Logic bomb

Which of the wireless encryption protocols uses the RC4 symmetric algorithm for encrypting wireless communication?


Options are :

  • EAP
  • WPA2
  • WEP
  • TLS

Answer :WEP

Which type of malware is difficult to detect and replaces key operating system files?


Options are :

  • Worm
  • Trojan
  • Logic bomb
  • Rootkit

Answer :Rootkit

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 6

When working with asymmetric encryption, which of the following is used to encrypt a message sent from Bob to Sue?


Options are :

  • Bob?s private key
  • Bob?s public key
  • Sue?s private key
  • Sue?s public key

Answer :Sue?s public key

Which authentication technology makes use of a key distribution center composed of an authentication server and a ticket-granting service?


Options are :

  • Kerberos
  • Sesame
  • Single sign-on
  • RADIUS

Answer :Kerberos

What is the security term for disabling unnecessary services on a system and uninstalling unnecessary software?


Options are :

  • System reduction
  • Network hardening
  • System hardening
  • Application restriction

Answer :System hardening

N10-006 CompTIA Network+ Certification Practice Test Set 8

Which of the following keys is used for nonrepudiation?


Options are :

  • Public key
  • Private key
  • Symmetric key
  • Hash

Answer :Private key

Which of the following security controls is designed to prevent tailgating?


Options are :

  • Separation of duties
  • Multifactor authentication
  • Least privilege
  • Mantrap

Answer :Mantrap

The network administrator for your office has configured the company web site for SSL by applying a certificate to the site. What port will you need to open on the firewall to allow communication to the site?


Options are :

  • 22
  • 80
  • 443
  • 53

Answer :443

CompTIA JK0-801 A Laptop Printer and Operating certify Exam Set 6

What is the term used when two different pieces of data generate the same hash value?


Options are :

  • Disruption
  • Collision
  • Crossover error
  • Interference

Answer :Collision

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions