CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 7

Joel manages network security for an insurance company. He's concerned about the offices that are too open to public traffic and exposed RJ45 jacks where someone could access the network. Which of the following is best to address his concerns?


Options are :

  • ACL
  • IDS
  • VLAN
  • Port Security

Answer :Port Security

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 14

Which term best describes sensitive medical information?


Options are :

  • AES
  • PHI
  • PII
  • TLS

Answer :PHI

Mark is currently configuring a new e-commerce server. He's concerned about security issues, so which of the following would be the best location to place his e-commerce server?


Options are :

  • DMZ
  • Intranet
  • Guest network
  • Extranet

Answer :DMZ

Jamie is worried some users on her network could be accessing some files they don't have a reason to view, such as files not required for their job. Which of the following would best determine if this is happening?


Options are :

  • Usage audit and review
  • Permissions auditing and review
  • Account maintenance
  • Policy review

Answer :Usage audit and review

CompTIA LX0-102 Linux Part 2 Certification Practice Exam Set 3

Caleb was tasked with setting up access control for a server. The requirements state that lower privileged users should not be able to see or access files or data that is meant for higher privileged users. What access control model is best suited to fit these requirements?


Options are :

  • MAC
  • DAC
  • RBAC
  • SAML

Answer :MAC

Of the following, what best describes an attack that attaches some malware to a legitimate program so when it's installed on a machine, the malware is inadvertently installed as well?


Options are :

  • Backdoor
  • Trojan horse
  • RAT
  • Polymorphic virus

Answer :Trojan horse

Tyson believes there's a problem accessing the DHCP server from a specific client and would like to check by getting a new dynamic IP address. What command can help him achieve this?


Options are :

  • ipconfig /request
  • NETSTAT -renew
  • ipconfig /renew
  • NETSTAT /request

Answer :ipconfig /renew

FC0-U51 CompTIA IT Fundamentals Certification Exam Set 10

Laura is worried about an attacker getting information in regard to her company's network resources. Which protocol should be implemented that would help mitigate this risk?


Options are :

  • LDAP
  • TLS
  • SNMP
  • LDAPS

Answer :LDAPS

One of your projects is to configure a WLAN that doesn't require your users to provide any credentials to connect. What type of authentication is this describing?


Options are :

  • IV
  • WEP
  • WPA
  • Open

Answer :Open

You just received an email from Bob, your investment banker, stating that he completed the wire transfer of $20,000 to your bank account in Vietnam. The problem is, you don't have a bank account in Vietnam! You immediately call Bob to ask what is happening. Bob explains that he received an email from you requesting the transfer. You insist you never sent that email to Bob initiating the transfer. What aspect of PKI is used to BEST ensure that a sender actually sent a particular email message?


Options are :

  • CRL
  • Trust models
  • Recovery agents
  • Non-repudiation

Answer :Non-repudiation

CompTIA CySA+ (CS0-001) 5 Practice Certification Exams Set 3

Using the image provided, place the port numbers in the correct order with their associated protocols:


Options are :

  • 53, 69, 25, 80
  • 80, 53, 69, 25
  • 69, 25, 80, 53
  • 25, 80, 53, 69

Answer :69, 25, 80, 53

SY0-401 CompTIA Security+ Certification Practice Exam Set 9

How would you appropriately categorize the authentication method being displayed here?



Options are :

  • Biometric authentication
  • One-time password authentication
  • Multi-factor authentication
  • PAP authentication

Answer :PAP authentication

Which of the following types of attacks occurs when an attacker calls up people over the phone and attempts to trick them into providing their credit card information?


Options are :

  • Phishing
  • Hoax
  • Vishing
  • Pharming
  • Spear phishing

Answer :Vishing

You are working as a security analyst and are reviewing the logs from a Linux server. Based on the portion of the logs displayed here, what type of malware might have been installed on the server? 

Based on the output provided, what type of malware may have been installed on this user's computer?


Options are :

  • Trojan
  • Virus
  • Logic bomb
  • Ransomware

Answer :Logic bomb

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 2

Using the image provided, select four security features that you should use with a smart phone provided through a COPE policy in your organization?


Options are :

  • Remote wipe, Location tracking, Host-based firewall, Cable lock
  • Cellular data, Remote wipe, Location tracking, MDM
  • Cable lock, Network sniffer, Cellular data, Remote wipe
  • MDM, Location tracking, Host-based firewall, Remote wipe

Answer :Cellular data, Remote wipe, Location tracking, MDM

Lonnie noticed that attackers have breached his WiFi network and have gained access via a wireless access point administrative panel and logged in with the credentials the WAP was shipped with. What best describes this issue?


Options are :

  • Default configuration
  • Race conditions
  • Failure to patch
  • Weak encryption

Answer :Default configuration

In mobile devices, which of the following algorithms is typically used??


Options are :

  • 3DES
  • DES
  • ECC
  • AES

Answer :ECC

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 12

Rhonda manages account security for her company. She's noticed a receptionist who has an account with a six-character password that hasn't been changed in two years and her password history isn't maintained. What is the most significant problem with this account?


Options are :

  • Nothing, this is adequate for a low-security position
  • The password length is the most significant problem
  • The lack of password history is the most significant problem
  • The age of the password is the most significant problem

Answer :The password length is the most significant problem

Neil, a network administrator for a small firm, has discovered several machines on his network are infected with malware. The malware is sending a flood of packets to an external target. What describes this attack?


Options are :

  • SYN flood
  • DDoS
  • Botnet
  • Backdoor

Answer :DDoS

Ashley is attempting to increase security at her company. She's currently creating an outline of all aspects of security that will need to be evaluated and acted on. Of the following terms, which one describes the process of improving security in a trusted OS?


Options are :

  • FDE
  • Hardening
  • SED
  • Baselining

Answer :Hardening

CompTIA SY0-401 Security Certification Practice Exam Set 5

Shannon works for a security company that performs pen tests for clients. She's currently conducting a test of an e-commerce company and discovers that after compromising the web server, she can use the web server to launch a second attack into the company's internal network. What type of attack is this considered?


Options are :

  • Internal attack
  • White-box testing
  • Black-box testing
  • A pivot

Answer :A pivot

Ashley is the network administrator for a company. She proceeds to delete the account for a user who left the company last week. The user's files were encrypted with a private key. How can Ashley view these files?


Options are :

  • They can be decrypted using the backup user account.
  • They can be decrypted using a recovery agent.
  • They must be re-created from the former user's account.
  • They can be decrypted using a CRL.

Answer :They can be decrypted using a recovery agent.

Of the following, which item is a list of applications approved for use on your network?


Options are :

  • Blacklist
  • Red list
  • Whitelist
  • Orange list

Answer :Whitelist

Comptia Linux+ LX0-103 Certification Exam Practice Test Set 6

Of the following, which best describes a compromised collection of computers being controlled from one central point?


Options are :

  • Zombienet
  • Botnet
  • Nullnet
  • Attacknet

Answer :Botnet

As the security director, you identify a security risk to a planned network migration. You decide to continue with the current migration plan anyway since you deem it to be low risk. What type of response technique has been demonstrated?


Options are :

  • Accept
  • Transfer
  • Avoid
  • Mitigate

Answer :Accept

Paul is the web security administrator for a website that does online auctions. A few users are complaining that when they log in to the website, they get a message stating it's down to try again later. Paul checks and he can visit the site without any problem, even from outside of the network. He also checks the web server log but there is no entry of these users ever connecting. Of the following, which best explains this situation?


Options are :

  • Typosquatting
  • SQL injection
  • Cross-site scripting
  • Cross-site request forgery

Answer :Typosquatting

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 7

Neil is given the task of creating a wireless network for his company. The wireless network needs to implement a wireless protocol that provides the maximum level of security while providing support for older wireless devices, simultaneously. Which protocol should be used?


Options are :

  • WPA
  • WPA2
  • WEP
  • IV

Answer :WPA

You have noticed your company lacks deterrent controls. As the new security administrator, which of the following would you install that satisfies your needs?


Options are :

  • Lighting
  • Audit logs
  • Audible alarm
  • Antivirus scanner

Answer :Lighting

Scott is the CISO for a bank. In recent readings, he read about an attack where the attacker was able to enumerate all the network resources and was able to make some resources unavailable. All of this was done by exploiting a single protocol. Which protocol would need to be secured to mitigate this attack?


Options are :

  • SNMP
  • LDAP
  • HTTP
  • DHCP

Answer :LDAP

CompTIA Security+ Cert. (SY0-501) Practice Tests Set 5

Kevin is going over his company's recertification policy. Which is the best reason to recertify?


Options are :

  • To audit usage
  • To enhance onboarding
  • To audit permissions
  • To manage credentials

Answer :To audit permissions

David, a programmer, is using the waterfall method for application development. Using this method, at which phase of the SDLC can he stop implementing security measures?


Options are :

  • Requirements
  • Design
  • Implementation
  • Retirement

Answer :Retirement

Tracie has been using a packet sniffer to observe traffic in the company network and has noticed that traffic between the web server and the database server is sent in clear text. She would like a solution that will encrypt traffic and also leverage the existing digital certificate infrastructure the company has. Which of the following is the best solution?


Options are :

  • TLS
  • SSL
  • IPSec
  • WPA2

Answer :TLS

NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 3

Buddy is the security manager for a bank and has recently been reading about malware that accesses system memory modules. He would like to find a solution that keeps programs from utilizing system memory. Which of the options would be the best solution?


Options are :

  • DEP
  • FDE
  • UTM
  • IDS

Answer :DEP

Steven is constantly receiving calls from wireless users who are being redirected to a login page when they connect to the network. The login page comes up whenever the users first connect to the network and attempt to access any website outside of the local area network from within their web browsers. Which of the following is causing this to happen?


Options are :

  • WEP
  • Key stretching
  • MAC filtering
  • Captive portal

Answer :Captive portal

You are a security analyst and you have just successfully removed malware from a virtual server. Which could you use to return the virtual server to its last known good state?


Options are :

  • A sandbox
  • A hypervisor
  • A snapshot
  • Elasticity

Answer :A snapshot

220-701 A+ Essentials Certification Practice Exam Set 10

A local competitor is offering a new service that is predicted to sell strong. After much research, your company has decided not to launch a competing service due to the uncertainty of the market and the large investment required. Which best describes your company's decision?


Options are :

  • Risk transfer
  • Risk avoidance
  • Rick acceptance
  • Risk mitigation

Answer :Risk avoidance

Jamie recently downloaded a program from an unknown website and now his client files have had their file extensions changed and he cannot open them. He received a popup window that informed him that his files were now encrypted and he must pay some bitcoins to get them decrypted. What has happened?


Options are :

  • His machine has a rootkit
  • His machine has a logic bomb
  • His machine has a boot sector virus
  • His machine has ransomware

Answer :His machine has ransomware

What type of attack is focused on targeting a specific individual like the CEO of a company?


Options are :

  • Spear phishing
  • Targeted phishing
  • Phishing
  • Whaling

Answer :Whaling

CLO-001 CompTIA Cloud Essentials Certification Practice Test Set 4

Of the listed principles, which one is the most important in managing account permissions?


Options are :

  • Account recertification
  • Usage auditing
  • Standard naming conventions
  • Account recovery

Answer :Account recertification

As the manager for network operations at his company, Shane saw an accountant in the hall who thanks him for keeping the antivirus software up to date. When asked what he means, he mentions one of the IT staff members named Michael called him yesterday and remotely connected to his PC to update the antivirus…but there's no employee named Michael. What happened?


Options are :

  • IP spoofing
  • MAC spoofing
  • Man-in-the-middle attack
  • Social engineering

Answer :Social engineering

You're responsible for an always-on VPN connection for your company and have been told that it must utilize the most secure mode for IPSec possible. Which of the following is best?


Options are :

  • Tunneling
  • AH
  • IKE
  • Transport

Answer :Tunneling

220-701 A+ Essentials Certification Practice Exam Set 12

Of the following terms, which one refers to the process of establishing a standard for security?


Options are :

  • Baselining
  • Security evaluation
  • Hardening
  • Normalization

Answer :Baselining

One of the following items automatically updates browsers with a list of root certificates from an online web source used to track which certificates can be trusted, which one is it?


Options are :

  • Trust model
  • Key escrow
  • PKI
  • RA

Answer :Trust model

Kristi is setting up database servers on their own subnet. She has placed them on 10.10.3.3/29. How many nodes can be allocated in this subnet?


Options are :

  • 32
  • 16
  • 8
  • 6

Answer :6

CompTIA JK0-019 E2C Network Media & Topologies Practice Exam Set 4

Cheyenne is doing a penetration test for a client's network and is currently gathering information from sources such as archive.org, netcraft.com, social media, and other information websites. What stage has just been described?


Options are :

  • Active reconnaissance
  • Passive reconnaissance
  • Initial exploitation
  • Pivot

Answer :Passive reconnaissance

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions