CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 6

You have been asked by the incident response team leader to perform a forensic examination on a workstation that is suspected to be infected with malware. You remember from your training that you must collect digital evidence in the proper order to protect it from being changed during your evidence collection efforts. Which of the following describes the correct sequence to collect the data from the workstation?


Options are :

  • RAM, CPU cache, Swap, Hard drive
  • Hard drive, Swap, CPU Cache, RAM
  • CPU Cache, RAM, Swap, Hard drive
  • Swap, RAM, CPU Cache, Hard drive

Answer :CPU Cache, RAM, Swap, Hard drive

CompTIA JK0-801 A+ Certification Part – 2 Practice Exam Set 4

You currently hold the position of Network Director and have been tasked with creating next year’s budget. You have requested $250,000 in order to fund the cyber incident response team. Which of the following should not be submitted as part of your budget request?


Options are :

  • ALE expenses
  • Equipment expenses
  • Training expenses
  • Man-hour expenses

Answer :ALE expenses

Corbett is managing the security at his company and one of his greatest concerns is that employees might exfiltrate sensitive data by walking out the front door with it. Of the following, which should be implemented first?


Options are :

  • IPS
  • Routine audits of user machines
  • VLAN
  • USB blocking

Answer :USB blocking

As a network security analyst, you’ve been instructed to bring an affected system back into the company’s environment and verify that it will not lead to another incident. You have tested, monitored, and validated that the system is not currently being compromised. Which process have you completed?


Options are :

  • Lessons learned
  • Preparation
  • Recovery
  • Containment

Answer :Recovery

CT0-101 Convergence+ Certification Practice Exam Set 1

How would you appropriately categorize the authentication method being displayed here?


Options are :

  • Biometric authentication
  • One-time password authentication
  • Multi-factor authentication
  • PAP authentication

Answer :Multi-factor authentication

Based on the image provided, what type of attack is occurring?


Options are :

  • SYN flood
  • Smurf attack
  • Ping flood
  • DDoS

Answer :SYN flood

Which of the following types of attacks occurs when an attacker sends unsolicited messages over Facebook messenger?


Options are :

  • Pharming
  • Phishing
  • Spimming
  • Spamming
  • Spear phishing

Answer :Spimming

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 9

Review the network diagram provided. Which of the following ACL entries should be added to the firewall to allow only the Human Resources (HR) computer to have SMB access to the file server (Files)?

(Note: The firewall in this network is using implicit deny to maintain a higher level of security. ACL entries are in the format of Source IP, Destination IP, Port Number, TCP/UDP, Allow/Deny.)


Options are :

  • 172.16.1.3, 192.168.1.12, ANY, TCP, ALLOW
  • 172.16.1.3, 192.168.1.12, 445, TCP, ALLOW
  • 192.168.1.12, 172.16.1.3, 445, UDP, DENY
  • 172.16.1.12/24, 192.168.1.3/24, 445, TCP, ALLOW

Answer :172.16.1.3, 192.168.1.12, 445, TCP, ALLOW

Dion Training is concerned with students entering the server room without permission. To prevent this from occurring, the organization wants to purchase and install an access control system that will allow each instructor to have access using an RFID device. Which of the following authentication mechanisms should Dion Training use to meet this requirement?


Options are :

  • Biometric reader
  • Proximity badge
  • Mantrap
  • CCTV

Answer :Proximity badge

David was investigating a breach on a web server where an attacker used a sophisticated technique and defaced the website, leaving messages that were denouncing the public policies of the company. He and his team are trying to determine the type of actor that most likely committed the breach. Based on the information provided, who was the likely threat actor?


Options are :

  • A script
  • A nation-state
  • Organized crime
  • Hacktivists

Answer :Hacktivists

CompTIA HT0-201 DHTI+ Certification Practice Exam Set 3

Hank is the network administrator responsible for managing the web server cluster for an e-commerce company. He’s worried about failover and load-balancing. He would like to use all the servers in the cluster to accomplish load-balancing. What would best accomplish this?


Options are :

  • Active-active
  • Active-passive
  • Affinity
  • Round-robin

Answer :Active-active

Josh is the security admin for a large bank. He’s worried about malware, specifically, spyware, that could compromise customer data. Which of the following is the best approach for the mitigation of the threat?


Options are :

  • Computer usage policies, network antimalware, and host antimalware
  • Host antimalware and network antimalware
  • Host and network antimalware, computer policies, and website whitelisting
  • Host and network antimalware, computer policies, and employee training

Answer :Host and network antimalware, computer policies, and employee training

A web application has been discovered that can generate a memory leak. What type of attack would this leave the application vulnerable to?


Options are :

  • DoS
  • Backdoor
  • SQL injection
  • Buffer overflow

Answer :DoS

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 24

In an effort to increase the security of their passwords, Ted’s company has added a salt and cryptographic hash to their passwords prior to storing them. To further increase security, they run this process many times before storing the passwords. What is this technique called?


Options are :

  • Key stretching
  • Rainbow table
  • Salting
  • Collision resistance

Answer :Key stretching

You’re the network administrator for a large university which has numerous systems that require you to monitor the logs and analyze the activity. What is the best approach to view and analyze logs from a central server?


Options are :

  • NAC
  • Port Forwarding
  • IDS
  • SIEM

Answer :SIEM

Why would a company want to utilize a wildcard certificate for their servers?


Options are :

  • To secure the certificate's private key
  • To increase the certificate's encryption key length
  • To reduce the certificate management burden
  • To extend the renewal data of the certificate

Answer :To reduce the certificate management burden

CompTIA N10-004 Network+ Certification Practice Test Set 8

If you had a workstation that wasn't hardened, what would this be an example of?


Options are :

  • Risk
  • Threat
  • Exposure
  • Mitigate

Answer :Risk

Matt is investigating a breach in his company network and discovers the attacker used an old account of someone who is no longer at the company. The account was still active. Which of the following describes this vulnerability?


Options are :

  • Improperly configured accounts
  • Untrained users
  • Using default configuration
  • Failure to patch systems

Answer :Improperly configured accounts

Jeffrey, the Security Operations Center director for Security Time Corporation, received a pop-up message on his workstation that said “You will regret firing me, just wait until Christmas!” He suspects the message that a disgruntled former employee may have setup a piece of software to create this pop-up on his machine, and is concerned what other code might be lurking that will create a negative effect on Christmas. He directs his team of cybersecurity analysts to begin search the network for this suspicious code. What type of malware are they searching for?


Options are :

  • Worm
  • Trojan
  • Adware
  • Logic bomb

Answer :Logic bomb

220-701 A+ Essentials Certification Practice Exam Set 7

The public library has had a recent issue with their laptops being stolen from their computer lab. Since this is a public library, it is not a high security area and is fully accessible by patrons during the day. What is the best way to prevent the theft of the laptops?


Options are :

  • Motion sensors
  • Mobile device management
  • Cable locks
  • CCTV

Answer :Cable locks

An analyst is reviewing the logs from the network and notices that there have been multiple attempts from the open wireless network to access the networked HVAC control system. The open wireless network must remain openly available so that visitors are able to access the internet. How can this type of attack be prevented from occurring in the future?


Options are :

  • Implement a VLAN to separate the HVAC control system from the open wireless network
  • Install a IDS to protect the HVAC system
  • Enable NAC on the open wireless network
  • Enable WPA2 security on the open wireless network

Answer :Enable NAC on the open wireless network

Melanie is working as a network administrator for a large company which frequently has nonemployees in this company such as clients and vendors. She’s been directed to provide nonemployees with access to the Internet. Which is the best way to accomplish this?


Options are :

  • Establish a guest network
  • Allow nonemployees to connect to the DMZ only
  • Allow nonemployees to connect to the Internet only
  • Establish limited accounts on your network for all nonemployees to use

Answer :Establish a guest network

CompTIA N10-004 Network+ Certification Practice Test Set 4

Scott is using smart cards for authentication into his company network. He’s working to classify the type of authentication for a report that’s due to his CIO. What type of authentication is Scott using?


Options are :

  • Type I
  • Type II
  • Type III
  • Strong

Answer :Type II

Which of these supersedes Blowfish?


Options are :

  • RSA
  • Twofish
  • MD5
  • PBKDF2

Answer :Twofish

Of the options below, choose the IPSec protocol that provides authentication, as well as encryption?


Options are :

  • AH
  • ESP
  • IKE
  • ISAKMP

Answer :ESP

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 2

Of the following, which attack seeks to attack a website, based on the trust of an authenticated user?


Options are :

  • XSS
  • CSRF
  • Buffer overflow
  • RAT

Answer :CSRF

You work for a company where employees are allowed to use tablets. They can choose from four approved choices, but the employee must purchase the device. What best describes this?


Options are :

  • BYOD
  • CYOD
  • COPE
  • BYOE

Answer :CYOD

Scott is the CISO of a bank. He’s received an email with a suspicious link, encouraging him to click the link for a survey. Being security minded, he doesn’t normally click links, however, this email calls him by name and claims to be a follow up from a conference he recently attended. Which of the following describes what is happening here?


Options are :

  • Clickjacking
  • Social engineering
  • Spear phishing
  • Whaling

Answer :Whaling

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 25

Nick works for a small company as a security administrator. He’s attempting to improve security throughout the network. Which step should be taken first?


Options are :

  • Implement antimalware on all computers
  • Implement acceptable use policies
  • Turn off unneeded services on all computers
  • Turn on host-based firewalls on all computers

Answer :Turn off unneeded services on all computers

Steven is working to implement biometrics for his company and he is trying to get the false rejection rate and the false acceptance rate to the same level. What term is appropriate for this?


Options are :

  • Crossover error rate
  • Leveling
  • Balanced error rate
  • Remediation

Answer :Crossover error rate

The WiFi Alliance recommends a passphrase of how many characters in length for it to meet WPA2-Personal security requirements?


Options are :

  • 6
  • 8
  • 1
  • 16

Answer :8

CL0-001 CompTIA Cloud Essentials Practice Test Set 7

You have noticed there are more entries in your network’s DNS that point legitimate domains to potentially harmful IP addresses. What best describes this attack?


Options are :

  • A backdoor
  • An APT
  • DNS poisoning
  • A Trojan horse

Answer :DNS poisoning

You are currently employed by a social media website. You’re wanting to integrate users’ accounts with other resources from the web. In order to do so, you need to allow authentication to be used across different domains and while doing so, you mustn’t expose your users’ passwords to these services. Of the listed principles, which would be the most effective to accomplish this goal?


Options are :

  • Kerberos
  • SAML
  • OAuth
  • OpenID

Answer :OAuth

Matt works for an insurance company that has a selection of Operating Systems, including Windows and Linux. In this environment, which system determines the network operating system?


Options are :

  • The OS of the DNS server
  • The OS of the domain controller
  • The OS of the majority of servers
  • The OS of the majority of client computers

Answer :The OS of the domain controller

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Of the following options, what does a geofence accomplish?


Options are :

  • Provides the location for a mobile device
  • Limits the range a mobile device can be used in
  • Determines WiFi coverage areas
  • Segments the WiFi

Answer :Limits the range a mobile device can be used in

Which of these should be used for remote access authentication for users who have smart cards?


Options are :

  • PEAP
  • EAP-TLS
  • CHAP
  • MS-CHAPv2

Answer :EAP-TLS

Jason has installed multiple virtual machines on a single physical server. He needs to ensure that the traffic is logically separated between each virtual machine. How can Jason best implement this requirement?


Options are :

  • Configure a virtual switch on the physical server and create VLANs
  • Conduct system partitioning on the physical server to ensure the virtual disk images are on different partitions
  • Create a virtual router and disable the spanning tree protocol
  • Install a virtual firewall and establish an access control list

Answer :Configure a virtual switch on the physical server and create VLANs

CompTIA JK0-022 Security Cryptography Certification Exam Set 8

John is in charge of monitoring IDS activity for his network. He’s noticed twice in the past month that there’s been activity reported to the IDS that’s actually legitimate traffic. Of the following, which best describes this activity?


Options are :

  • False negative
  • Passive
  • Active
  • False positive

Answer :False positive

You have been hired as a consultant to Small Time Corp Incorporated to review their current disaster recovery plans. The CEO has requested that the plans ensure that the company can limit downtime in the event of a disaster, but due to staffing concerns he simply cannot approve the budget to implement or maintain a fully redundant offsite location to ensure a 99.999% availability. Based on that limitation, what should you recommend to the CEO of Small Time Corp?


Options are :

  • Recommend that the company install a set of redundant servers to another part of the company's office building
  • Recommend that the company retain all hardware at their office building but ship their backups to an offsite facility for storage
  • Recommend that the company retain their backups in their office building, but install redundant services in a colocated datacenter within a different company
  • Recommend that the redundant hardware be maintained at the offsite location and configure it to be ready for the recovery of the company's backup data when needed

Answer :Recommend that the redundant hardware be maintained at the offsite location and configure it to be ready for the recovery of the company's backup data when needed

Matthew is working to set up new wireless APs throughout his company. The WAP has just the radio transceiver and no additional functionality. What best describes the WAPs?


Options are :

  • Fat
  • Repeater
  • Thick
  • Thin

Answer :Thin

CompTIA JK0-022 Security Cryptography Certification Exam Set 7

Marsha is currently setting up accounts for her company and would like to set up accounts for an Oracle Database server. Which would be the best type of account to assign for the database service?


Options are :

  • User
  • Guest
  • Admin
  • Service

Answer :Service

Bryan manages the network at his company. He’s been using SNMP for many years and is currently using SNMP v2. Someone recently suggested upgrading to SNMP v3. What is the primary benefit that can be achieved by this upgrade?


Options are :

  • It’s much faster
  • It integrates with SIEM
  • It uses CHAP authentication
  • It’s encrypted

Answer :It’s encrypted

You are installing a network for a home-based business. There are only four things that will use a wireless LAN and you’re installing a SOHO router between the LAN clients and the Internet source. Which of the following is a good choice for a WPA2-PSK password?


Options are :

  • 123456
  • XXrcERr6Euex9pRCdn3h3
  • bRtlBv
  • HomeBusiness

Answer :XXrcERr6Euex9pRCdn3h3

CompTIA N10-004 Network+ Certification Practice Test Set 7

You’re tasked with selecting an authentication method for your company’s servers. You’re looking for a method that frequently reauthenticates your clients to prevent any session hijacking. Of the provided principles, which would be the best choice?


Options are :

  • PAP
  • SPAP
  • CHAP
  • OAuth

Answer :CHAP

Nate is the network administrator responsible for the database cluster at his company. His connections are load-balanced in the cluster with each new connection being sent to the next server in the cluster. What type of load-balancing is being implemented?


Options are :

  • Round-robin
  • Affinity
  • Weighted
  • Rotating

Answer :Round-robin

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions