CompTIA Security+ SY0-501 Questions & Answers Set 1

What is MD5 susceptible to?

Options are :

  • Decryption
  • Man in the middle
  • Brute force
  • Collision

Answer : Collision

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 23

What does an administrator use to block programs from being installed, in order to maintain a more secure environment?

Options are :

  • Application whitelisting
  • Application blacklisting
  • Application quarantines
  • Application filtering

Answer : Application blacklisting

What Windows tool is used to review CPU performance?

Options are :

  • Performance Monitor
  • Wireshark
  • Nessus
  • LANsurveyor

Answer : Performance Monitor

What RAID number is used for striping?

Options are :

  • 3
  • 2
  • 1
  • 0

Answer : 0

CompTIA Security+ Cert. (SY0-501) Practice Tests Set 1

What is the term given to authentication that requires both the server and the client to verify their identity?

Options are :

  • Double
  • Bidirectional
  • Reciprocal
  • Mutual

Answer : Mutual

What is a digitally signed electronic document that binds a public key with a user identity?

Options are :

  • Certificate
  • Certificate authority
  • PKI
  • Public key

Answer : Certificate

What type of access only gives users privileges needed to do their job?

Options are :

  • Job rotation
  • Least privilege
  • Implicitly deny
  • Separation of duties

Answer : Least privilege

CompTIA Security+ Cert. (SY0-501) Practice Tests Set 3

What can be used to bypass VLAN restricted access?

Options are :

  • MAC spoofing
  • IP spoofing
  • SQL injection
  • VLAN hopping

Answer : VLAN hopping

What is the term given to randomizing the hashing process in encrypted passwords?

Options are :

  • Rainbow
  • Hashing
  • Crypting
  • Salting

Answer : Salting

What protocol does Syslog use for auditing and connections?

Options are :

  • IP
  • UDP
  • SNMP
  • TCP

Answer : UDP

CompTIA CAS-002 Advanced Security Practitioner Certify Exam Set 3

What SNMP scenario monitors software deployed by a network management system?

Options are :

  • Managed devices
  • Network systems
  • Hosting
  • Agent

Answer : Agent

What is a common, free protocol analyzer used in network diagnosis?

Options are :

  • Performance Monitor
  • Cain and Abel
  • Wireshark
  • Nessus

Answer : Wireshark

What Windows policy is used to block access to applications?

Options are :

  • Don't Run Specified Windows Applications
  • Blacklisted Applications
  • Block These Applications
  • Access Only

Answer : Don't Run Specified Windows Applications

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 13

What is the weakest encryption option for Wi-Fi?

Options are :

  • WEP
  • WPA2
  • WPA
  • AES

Answer : WEP

Which of the following devices can be used to perform a denial of service on a wireless access point?

Options are :

  • Jammers
  • Butt set
  • Patchers
  • Crimpers

Answer : Jammers

What type of attack is a ping flood?

Options are :

  • TCP flood
  • HTTP flood
  • IP flood
  • ICMP flood

Answer : ICMP flood

FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 6

What command is used in the Windows Run menu to start Windows Performance Monitor?

Options are :

  • monitor.exe
  • execute.exe
  • pmonitor.exe
  • perfmon.exe

Answer : perfmon.exe

What attack makes use of a trojan that infects web pages?

Options are :

  • Watering hole
  • Man in the middle
  • Man in the browser
  • Replay

Answer : Man in the browser

What is used as a secondary server in case a primary server fails?

Options are :

  • Redundant ISP
  • Redundant power
  • Redundant storage
  • Failover clusters

Answer : Failover clusters

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 4

What malicious software silently collects data and sends it to an attacker without the user's knowledge?

Options are :

  • Rootkit
  • Adware
  • Ransomware
  • Spyware

Answer : Spyware

What administrative tool is used by an enterprise to manage several BYOD devices?

Options are :

  • Router management and configurations
  • Central device beacons
  • Sanitizing applications
  • Mobile device management platforms

Answer : Mobile device management platforms

What can be used for malicious eavesdropping on a network with only a hub installed?

Options are :

  • Ethernet cable
  • Packet analyzer
  • Crimper
  • Router

Answer : Packet analyzer

CompTIA JK0-022 E2C Security+ Threats & Vulnerabilities Exam Set 1

What command in Windows lets you see a list of opened files from remote computers?

Options are :

  • remotefiles
  • seefiles
  • openfiles
  • localfiles

Answer : openfiles

What Wi-Fi encryption protocol is now deprecated and considered insecure?

Options are :

  • WPA2
  • WPA
  • WEP
  • Blowfish

Answer : WEP

What is used when a single honeypot isn't enough to trap a hacker?

Options are :

  • Honeywell
  • Dosnet
  • Botnet
  • Honeynet

Answer : Honeynet

Which of the following is an organized process of developing software?

Options are :

  • Deployment testing
  • Software development life cycle
  • Software patching
  • Life cycle testing

Answer : Software development life cycle

What hash algorithm was designed by the NSA and published by the NIST?

Options are :

  • MD5
  • SHA
  • Blowfish
  • AES

Answer : SHA

What type of redundancy is needed to ensure that one employee loss does not hurt the productivity of the organization?

Options are :

  • Redundant sites
  • Contract redundancy
  • Succession planning
  • Employee backups

Answer : Succession planning

CompTIA JK0-801 A+ Certification Certified Practice Exam Set 2

What procedure is used to remove an employee from an identity management system?

Options are :

  • Onboarding
  • Offboarding
  • Separation of duties
  • Mandatory vacations

Answer : Offboarding

What can an administrator use to stop new browser windows from opening and enticing users to download malicious software?

Options are :

  • Windows Firewall
  • Google toolbar
  • Popup blocker
  • Antivirus software

Answer : Popup blocker

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions