CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 3

Caleb is installing an HVAC system in his data center and would like to know what this HVAC system will have the most impact on. Please choose from the following:

Options are :

  • Confidentiality
  • Availability
  • Fire suppression
  • Monitoring access to the datacenter

Answer :Availability

You have been tasked with doing a vulnerability assessment on a company’s network and determine that they are using 802.1x for secured access. Which of the following can a threat actor use to bypass the current network security?

Options are :

  • MAC spoofing
  • ARP poisoning
  • Ping of death
  • Xmas attack

Answer :MAC spoofing

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 8

As the security administrator, you’re configuring data label options for your R&D file server. Standard users can label documents as contractor, public, or internal. Which label should be assigned to company trade secrets?

Options are :

  • High
  • Top Secret
  • Proprietary
  • Low

Answer :Proprietary

Choose an agreement that is not as formal as a traditional contract but still has a level of importance to all involved parties?

Options are :

  • SLA
  • BPA
  • ISA
  • MOU

Answer :MOU

Of the following choices, which item best shows the state of a computer at the time it was collected by law enforcement?

Options are :

  • Screenshots
  • Identification
  • Tabletop exercise
  • Generating hash values

Answer :Screenshots

Practice Test : CompTIA A+ Certification 220-902

Malia has noticed some steganography tools on an employee’s computer. What is the greatest concern regarding an employee having steganography tools?

Options are :

  • Password cracking
  • Data exfiltration
  • Hiding network traffic
  • Malware

Answer :Data exfiltration

Stewart works for an organization where employees all have cloud-based solutions for data storage. Stewart has requested funding from the CIO in order to install a DLP solution. What security hazard, if any, is Stewart trying to solve?

Options are :

  • No security hazard
  • Malware from the cloud
  • Data exfiltration through the cloud
  • Security policies don’t apply to the cloud

Answer :Data exfiltration through the cloud

You manage the account access control and authorization at your work, a large college. There are approximately 30,000 students and 1,200 faculty/staff that you manage accounts for. Which of the following is the best access control/account management approach?

Options are :

  • Group-based
  • Location-based
  • MAC
  • DAC

Answer :Group-based

CAS-003 CompTIA Advanced Security Practitioner (CASP+) Exam Set 3

One of your tasks is being responsible for authentication methods for your company. You’ve implemented fingerprint scanners in order to gain access to server rooms. People are frequently denied access to the server room even though they are authorized. What problem is presented here?

Options are :

  • FAR
  • FRR
  • CER
  • EER

Answer :FRR

Of the following, which is a symmetric encryption algorithm that works with 128/192/256bit key versions?

Options are :

  • AES
  • DES
  • RSA
  • TKIP

Answer :AES

You’ve noticed that users on your network use a specific bank for personal banking. Some users have been the victim of a recent attack, where they visited a fake bank website and their logins were compromised. They had all visited the bank from your network and they insist they typed in the correct URL. What is most likely the explanation for this?

Options are :

  • Trojan horse
  • IP spoofing
  • Clickjacking
  • DNS poisoning

Answer :DNS poisoning

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 9

You’re currently facing a common security issue that’s very difficult to control in a large environment. It happens when a user has more privileges than that required for the task the user needs to fulfill. This is the opposite of what principle?

Options are :

  • Separation of duties
  • Least privilege
  • Transitive trust
  • Account management

Answer :Least privilege

John David works for a large retail company that processes credit card purchases and has been asked to test the network for security issues. The specific test he is running involves checking policies, documentation and past incident reports. What describes this type of test?

Options are :

  • Vulnerability scan
  • Penetration test
  • Security audit
  • Security test

Answer :Security audit

Nicole noticed when she’s in a crowded area, she gets a stream of unwanted texts. They end when she leaves the area. What is the attack just described?

Options are :

  • Bluejacking
  • Bluesnarfing
  • Evil twin
  • Rogue access point

Answer :Bluejacking

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 15

Ellen manages network security and has discovered behavior on a computer that appears as a virus. She identified a file she thinks may be a virus, but no antivirus program has detected the file. Which could most likely be occurring?

Options are :

  • The computer has a RAT
  • The computer has a zero-day exploit
  • The computer has a logic bomb
  • The computer has a rootkit

Answer :The computer has a zero-day exploit

You currently use a PKI (public key infrastructure) in your company to issue digital certificates to users. Recently, you’ve had temporary contractors for a project that is now complete, and management has asked that all digital certificates be revoked. Which PKI component should be consulted for the request?

Options are :

  • CA
  • CRL
  • RA
  • CSR

Answer :CRL

Jamie is worried that some users on her network could be accessing some files they don’t have a reason to view, such as files not required for their job. Which of the following would best determine if this is happening?

Options are :

  • Usage audit and review
  • Permission auditing and review
  • Account maintenance
  • Policy review

Answer :Usage audit and review

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 10

Your company is looking for a secure backup tool for key storage in a PKI. Which one would you recommend?

Options are :

  • CSR
  • Key escrow
  • CRL
  • CA

Answer :Key escrow

Mike works for a company where employees have wearable technology, such as smartwatches. What is the most significant security concern for him in regard to such devices?

Options are :

  • These devices can distract employees
  • These devices can be used to carry data in/out of the company
  • These devices may not have encrypted drivers
  • These devices may not have strong passwords

Answer :These devices can be used to carry data in/out of the company

Caleb is running a port scan on a network to meet some requirements of a security audit. He has noticed that domain controller is using secured LDAP. Which port would lead him to that conclusion?

Options are :

  • 53
  • 389
  • 443
  • 636

Answer :636

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 24

Jason manages password management for his company. Sometimes users cannot remember their passwords. What is the best option for Jason to address this?

Options are :

  • Changing password history
  • Implementing password recovery
  • Eliminating password complexity
  • Lengthening password age

Answer :Implementing password recovery

Caleb is worried his SIEM logs aren’t being stored long enough or securely enough. He is aware that a breach may not be discovered until long after it occurs. This would require the company to analyze older logs, so it’s important that he finds a SIEM log backup solution that can do the following: handle all aggregate logs of the SIEM, be maintained for a long period of time, and maintain the integrity of logs being stored. Which of the following solutions would ensure the integrity of the data isn’t changed after storage?

Options are :

  • Back up to large-capacity external drives
  • Back up to large-capacity backup tapes
  • Back up WORM storage
  • Back up to tapes that will be stored off-site

Answer :Back up WORM storage

George is a security officer for a bank. When an executive has a laptop decommissioned, he wants to be sure that all of the data is completely wiped and unrecoverable, even via forensic tools. How many times should the hard drive be wiped?

Options are :

  • 1
  • 3
  • 5
  • 7

Answer :7

CompTIA JK0-017 E2C Project+ Certification Practice Exam Set 5

In your company, there are some computers on your network that still use Windows XP. They have to stay at XP and cannot be upgraded due to application specifications. The application doesn’t run on newer operating systems. What security issue does this pose?

Options are :

  • No special concerns; this is normal
  • The machines cannot be patched as XP is no longer supported
  • The machines cannot coordinate with a SIEM since XP doesn’t support that
  • The machines are more vulnerable to DoS attacks

Answer :The machines cannot be patched as XP is no longer supported

Michael manages the secure communications at his company and would like to give administrators the option to log in remotely and execute command-line functions. He would like for this to only be possible via a secure encrypted connection. What action should be taken on the firewall?

Options are :

  • Block port 23 and allow ports 20 and 21.
  • Block port 22 and allow ports 20 and 21.
  • Block port 22 and allow port 23.
  • Block port 23 and allow port 22.

Answer :Block port 23 and allow port 22.

Of the following, which is the most fundamental BIOS integrity technique?

Options are :

  • Verifying the BIOS version
  • Using a TPM
  • Managing BIOS passwords
  • Backing up the BIOS

Answer :Managing BIOS passwords

BR0-002 CompTIA Network + Bridge Practice Exam Set 5

As the security administrator, you advise the web development team to include a CAPTCHA on a webpage where users are able to register for an account. Which control is this referring to?

Options are :

  • Deterrent
  • Detective
  • Compensating
  • Degaussing

Answer :Deterrent

You are responsible for security for a defense contracting company and are concerned about users within your network exfiltrating data via sensitive documents to emails. What is the best solution to address this?

Options are :

  • Email encryption
  • USB blocking
  • NIPS
  • Content filtering

Answer :Content filtering

Isaac is looking for a physical access solution for his company. He needs the solution to use asymmetric cryptography or public-key cryptography to authorize users. What type of solution is he seeking?

Options are :

  • Asynchronous password token
  • Challenge response token
  • TOTP token
  • Static password token

Answer :Challenge response token

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 22

Frank is concerned that confidential documents, with proprietary information, may be leaked. The leaks could either be intentional or accidental, but he is looking for a solution that would embed some identifying information into documents in a way that it would not be seen by the reader but could be extracted with the right software. What technology would best meet these needs?

Options are :

  • Symmetric encryption
  • Steganography
  • Hashing
  • Asymmetric encryption

Answer :Steganography

Of the following cloud service models, which service gives the consumer the ability to use applications provided by the cloud service provider over the Internet?

Options are :

  • SaaS
  • PaaS
  • IaaS
  • CaaS

Answer :SaaS

Kenny is responsible for data backups from all the company servers. Two major concerns are the frequency of backup and the security of the backup data. Which feature, would be the most important?

Options are :

  • Using data encryption
  • Digitally signing the data
  • Using the automated backup scheduling
  • Hashing the backup data

Answer :Using data encryption

CompTIA JK0-801 A+ Certification Certified Practice Exam Set 3

You’re tasked with configuring a friend's SOHO router and noticed a PIN on the back of their router. What is the purpose of this PIN?

Options are :

  • This is a WEP PIN
  • This is a WPS PIN
  • This is a WPA PIN
  • This is a Bluetooth PIN

Answer :This is a WPS PIN

Millie is responsible for testing security and uses a tool that identifies vulnerabilities and provides mechanisms to test them by trying to exploit them. What best describes this tool?

Options are :

  • Vulnerability scanner
  • Exploit framework
  • Metasploit
  • Nessus

Answer :Exploit framework

Sheila is the security administrator for a company where most employees use handheld devices such as smartphones and tablets. The employees would like to use the devices for work and home as well. Which of the following is the most secure solution?

Options are :

  • COPE
  • CYOD
  • Geotagging
  • BYOD

Answer :COPE

CompTIA A+ 220 901

Jeff, a network administrator, has discovered that someone registered a domain name that is spelled just one letter different from the company's domain. The website with the misspelled URL is a phishing site. What best describes this attack?

Options are :

  • Session hijacking
  • Cross-site request forgery
  • Typosquatting
  • Clickjacking

Answer :Typosquatting

Frank is responsible for network security at a university where faculty members are being issued laptops. Many of the faculty members leave their laptops in their offices most of the time. Frank is concerned about device theft. In this situation, what would be the most cost-effective method to secure the laptops?

Options are :

  • FDE
  • GPS tagging
  • Geofencing
  • Cable locks

Answer :Cable locks

You have an asset valued at $16,000. The exposure factor of a risk affecting that asset is 35%. The annualized rate of occurrence is 75%. What is the SLE?

Options are :

  • $5,600
  • $5,000
  • $4,200
  • $3,000

Answer :$5,600

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 19

Of the listed principles below, which is NOT a common security policy type?

Options are :

  • Acceptable use policy
  • Social media policy
  • Password policy
  • Parking policy

Answer :Parking policy

As the network administrator, you are tasked with adding new employees to the identity and access management system. Which of the following best describes this process?

Options are :

  • Onboarding
  • Offboarding
  • Adverse action
  • Job rotation

Answer :Onboarding

You work for a company that requires a user’s credentials to include providing something they know and something they are. Which of the following types of authentication is being described?

Options are :

  • Token
  • Two-factor
  • Kerberos
  • Biometrics

Answer :Two-factor

CompTIA CySA+ Set 7

Janet manages the security of the database servers at the mortgage company where she works. The servers are Windows Server 2016; she’s concerned about file system security. Which Microsoft feature would be most helpful to implement security to the file systems?

Options are :

  • Password policies
  • EFS
  • Account lockout
  • UAC

Answer :EFS

Jody is worried about disgruntled employees stealing company documents and exfiltrating them from the network. She’s seeking a solution that will detect exfiltration and block it. What type of system is Jody seeking?

Options are :

  • IPS
  • SIEM
  • Honeypot
  • Firewall

Answer :IPS

Choose the scenario where using a shared account would pose the least security risk.

Options are :

  • For a group of tech support personnel
  • For guest Wi-Fi access
  • For students logging in at a university
  • For accounts with few privileges

Answer :For guest Wi-Fi access

220-801 CompTIA A+ Certification Practice Exam Set 10

As the manager for network operations at his company, Shane saw an accountant in the hall who thanks him for keeping the antivirus software up to date. When asked what he means, he mentions one of the IT staff members named Michael called him yesterday and remotely connected to his PC to update the antivirus…but there’s no employee named Michael. What happened?

Options are :

  • IP spoofing
  • MAC spoofing
  • Man-in-the-middle attack
  • Social engineering

Answer :Social engineering

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions