CompTIA Security+ SY0-501 Exam Preparation (Latest Version) Set 4

What term refers to a holistic approach to IT security including diversification of vendors, controls (both administrative and technical) and user training?


Options are :

  • C) Regulatory standard framework
  • D) Holistic IA
  • A) DMZ
  • B) Defense-in-depth

Answer :B) Defense-in-depth

Which of the following options is a protocol used to check if a certificate has been revoked?


Options are :

  • C) OCSP
  • D) MD5
  • A) PKI
  • B) CSR

Answer :C) OCSP

CAS-003 CompTIA Advanced Security Practitioner (CASP+) Exam Set 1

A new company policy requires hardware encryption for certain highly confidential systems. These existing systems do not already have a hardware component that can provide this functionality.


What is the easiest way to implement this new policy?


Options are :

  • B) PKI
  • A) RADIUS
  • D) Hardware Security Module
  • C) Trusted Platform Module

Answer :D) Hardware Security Module

Which of the following authentication protocols offer(s) countermeasures against replay attacks? (Select all that apply)


Options are :

  • a) IPsec
  • b) MPLS
  • e) CHAP
  • c) PAP
  • d) Kerberos

Answer :a) IPsec e) CHAP d) Kerberos

Which statements best describe the attributes of a script kiddie?

(Select 2 answers)


Options are :

  • a) Motivated by money
  • b) Low level of technical sophistication
  • e) Lack of extensive resources/funding
  • c) Motivated by ideology
  • d) High level of technical sophistication

Answer :b) Low level of technical sophistication e) Lack of extensive resources/funding

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 14

Which of the wireless technologies listed below are deprecated and should not be used due to their known vulnerabilities?

(Select 2 answers)


Options are :

  • d) WAF
  • c) WPA2
  • a) WPS
  • e) WEP
  • b) WAP

Answer :a) WPS e) WEP

In penetration testing, active reconnaissance involves gathering any type of publicly available information that can be used later for exploiting vulnerabilities found in the targeted system.


Options are :

  • True
  • False

Answer :False

Penetration test of a computer system without the prior knowledge on how the system that is to be tested works is commonly referred to as black-box testing.


Options are :

  • True
  • False

Answer :True

CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 7

Which of the following cryptographic hash functions is the least vulnerable to attacks?


Options are :

  • b) RIPEMD
  • c) SHA-512
  • d) MD5
  • a) SHA-1

Answer :c) SHA-512

You have joined a new enterprise as a member of the IT Security team. During on boarding you receive two computers, one with access to highly confidential systems and one with access to less critical data and the internet. You cannot send data or documents from one network to the other and have to manage separate credentials for each.


What concept best defines this approach?


Options are :

  • C) VPN
  • D) Data aggregated network segmentation (DANS)
  • A) Physical de-segmentation
  • B) Air gap

Answer :B) Air gap

A malfunction in preprogrammed sequential access to a shared resource is described as:


Options are :

  • a) Race condition
  • c) Memory leak
  • b) Buffer overflow
  • d) Pointer dereference

Answer :a) Race condition

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 6

Which of the following acronyms refers to a cryptographic hardware component capable of securely storing data like passwords and keys?


Options are :

  • A) TPM
  • C) DMZ
  • B) NAT
  • D) DLP

Answer :A) TPM

Which of the following answers refers to the contents of a rainbow table entry?


Options are :

  • b) IP address/Domain name
  • a) Hash/Password
  • c) Username/Password
  • d) Account name/Hash

Answer :a) Hash/Password

Which of the following terms best describes a threat actor type whose sole intent behind breaking into a computer system or network is monetary gain?


Options are :

  • b) Script kiddie
  • c) Organized crime
  • a) Hacktivist
  • d) Competition

Answer :c) Organized crime

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 3

Which of the following wireless technologies enables identification and tracking of tags attached to objects?


Options are :

  • b) GPS
  • a) WTLS
  • c) RFID
  • d) WAF

Answer :c) RFID

What is the name of a technology used for contactless payment transactions?


Options are :

  • a) NFC
  • b) SDN
  • d) WAP
  • c) PED

Answer :a) NFC

Which of the acronyms listed below refers to a cryptographic attack where the attacker has access to both the plaintext and its encrypted version?


Options are :

  • b) POODLE
  • a) KEK
  • c) KPA
  • d) CSRF

Answer :c) KPA

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 8

James is sending an email to Bob. To ensure confidentially James needs to send the email in an encrypted format using PKI. What will James use to encrypt the email so Bob can decrypt it?


Options are :

  • B) Bob's private key
  • D) James' private key
  • A) Bob's public key
  • C) James' public key

Answer :A) Bob's public key

Which of the following can be provided to an AAA system for the identification phase?


Options are :

  • D. Private certificate
  • B. Permissions
  • C. One-time token
  • A. Username

Answer :A. Username

A wireless disassociation attack is a type of:


Options are :

  • a) Downgrade attack
  • c) Denial of Service (Dos) attack
  • b) Brute-force attack
  • d) Cryptographic attack

Answer :c) Denial of Service (Dos) attack

CompTIA A+ (220-1001) Test Prep, Exams and Simulations Set 1

What type of public certificate can be used with multiple sub-domains?


Options are :

  • A) Multipurpose
  • D) Self-signed
  • B) Domain validated certificate
  • C) Wildcard

Answer :C) Wildcard

Which of the statements listed below describe the purpose behind collecting OSINT? (Select 3 answers)


Options are :

  • f) Active reconnaissance in penetration testing
  • d) Preparation before launching a cyberattack
  • e) Disabling unnecessary ports and services
  • c) Application whitelisting/blacklisting
  • a) Gaining advantage over competitors
  • b) Passive reconnaissance in penetration testing

Answer :d) Preparation before launching a cyberattack a) Gaining advantage over competitors b) Passive reconnaissance in penetration testing

A situation in which a web form field accepts data other than expected (e.g. server commands) is an example of:


Options are :

  • a) Zero-day vulnerability
  • b) Improper input validation
  • c) Default configuration
  • d) Improper error handling

Answer :b) Improper input validation

220-701 A+ Essentials Certification Practice Exam Set 2

An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?


Options are :

  • A. False negative
  • C. False positive
  • B. True negative
  • D. True positive

Answer :C. False positive

Your employer has always been very security conscious and to date does not use an company owned mobile or wireless devices like laptops and smart phones. A new project aims to evaluate options on the market for security implementing laptops within the company. One requirement is that all data stored on the laptop's drive must be encrypted.


What type of drive could fulfill this requirement?


Options are :

  • C) SED
  • D) RAID 0
  • B) VPN
  • A) PKI-SSD

Answer :C) SED

A modification introduced to a computer code that changes its external behavior (e.g. to maintain compatibility between a newer OS and an older version of application software) is called:


Options are :

  • d) Backdoor
  • c) Refactoring
  • a) Shimming
  • b) DLL injection

Answer :a) Shimming

CompTIA Cloud+ Certification Exam Prep CV002 - 2019 Set 4

Your employer has asked your team to define and implement a new network area that will be accessible to authorized 3rd party companies through a dedicated WAN connection. A critical requirement is that access to this new network area should not also allow network access to the companies internal network and systems.


What type of network best defines this setup?


Options are :

  • C) Guess WiFi
  • D) VLAN
  • B) Intranet
  • A) Extranet

Answer :A) Extranet

Which of the following answers lists an example of a cryptographic downgrade attack?


Options are :

  • c) POODLE
  • d) XSRF
  • b) KPA
  • a) MITM

Answer :c) POODLE

Which of the terms listed below refers to a software that no longer receives continuing support?


Options are :

  • d) SPoF
  • c) EOL
  • b) SDLC
  • a) OEM

Answer :c) EOL

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 7

The practice of optimizing existing computer code without changing its external behavior is known as:


Options are :

  • c) Data Execution Prevention (DEP)
  • a) DLL injection
  • b) Shimming
  • d) Refactoring

Answer :d) Refactoring

Which of the answers listed below describes the result of a successful DoS attack?


Options are :

  • c) Identity theft
  • b) Resource exhaustion
  • a) Code injection
  • d) Privilege escalation

Answer :b) Resource exhaustion

An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Management is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?


Options are :

  • D. Utilize role-based access control.
  • A. Create multiple application accounts for each user.
  • B. Provide secure tokens.
  • C. Implement SSO.

Answer :C. Implement SSO.

CompTIA JK0-801 A+ Certification Practical Exam Set 9

A junior security professional on your team is trying to export a public certificate and share it with a colleague outside of the IT department. They ask you if they should use a CER or PFX format.


Which format should be used?


Options are :

  • A) CER
  • B) PF
  • C) Both are acceptable
  • D) Neither are acceptable

Answer :A) CER

Which password attack takes advantage of a predefined list of words?


Options are :

  • a) Birthday attack
  • d) Brute-force attack
  • b) Replay attack
  • c) Dictionary attack

Answer :c) Dictionary attack

Penetration test performed by an authorized professional with the full prior knowledge on how the system that is to be tested works is called:


Options are :

  • a) Black-hat hacking
  • c) Black-box testing
  • b) White-box testing
  • d) White-hat hacking

Answer :b) White-box testing

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 3

What is the name of the process used to digitally sign executables?


Options are :

  • D) Code validation signature
  • C) Code pinning
  • B) Code signing
  • A) Executable Signature Signing

Answer :B) Code signing

Which of the following encryption methods does PKI typically use to securely project keys?


Options are :

  • D. Obfuscation
  • B. Digital signatures
  • C. Asymmetric
  • A. Elliptic curve

Answer :B. Digital signatures

One of the measures for bypassing the failed logon attempt account lockout policy is to capture any relevant data that might contain the password and brute force it offline.


Options are :

  • True
  • False

Answer :True

SY0-401 CompTIA Security+ Certification Practice Exam Set 7

What term defines an operating system that has been verified as having a sufficient level of security based on the Common Criteria for Information Technology Security Evaluation?


Options are :

  • D) Protection Profiled Operating System (PPOS)
  • C) Certified Secure Operating System (CSOS)
  • A) Trusted Operating System (TOS)
  • B) SFRs

Answer :A) Trusted Operating System (TOS)

You are responsible for network security within your employer's network architecture team. Your team is implementing a new network that can allow unauthenticated WiFi users access to the internet without allowing them access to any internal systems.

What type of WiFi network is this?


Options are :

  • A) DMZ
  • B) Guest
  • C) Extranet
  • D) NAT

Answer :B) Guest

Which cryptographic attack relies on the concepts of probability theory?


Options are :

  • c) Dictionary
  • a) KPA
  • d) Birthday
  • b) Brute-force

Answer :d) Birthday

Test : CompTIA Network+ (N10-007)

Which of the following types of keys is found in a key escrow?


Options are :

  • B. Private
  • A. Public
  • C. Shared
  • D. Session

Answer :B. Private

After feeding an input form field with incorrect data, a hacker gets access to debugger info providing extensive description of the error. This situation is an example of:


Options are :

  • d) Improper error handling
  • c) Brute-force attack
  • a) Fuzz testing
  • b) Improper input handling

Answer :d) Improper error handling

The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts.


Options are :

  • True
  • False

Answer :True

CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 2

A wireless jamming attack is a type of:


Options are :

  • d) Downgrade attack
  • a) Cryptographic attack
  • c) Brute-force attack
  • b) Denial of Service (Dos) attack

Answer :b) Denial of Service (Dos) attack

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions