CompTIA Security+ (SY0-501) Practice Exams with Simulations Set 8

Of the following RAID levels, which one is considered a "stripe of mirrors"?

Options are :

  • RAID 1+0
  • RAID 6
  • RAID 0
  • RAID 1

Answer :RAID 1+0

As the security administrator, you're concerned about a variety of attacks that could affect your company's web server. You've recently heard about an attack where an attacker sends more data to a target than the target is expecting. If done correctly, this can cause the target to crash. What type of action can best prevent this type of attack?

Options are :

  • An SPI firewall
  • An active IDS/IPS
  • Checking buffer boundaries
  • Checking user input

Answer :Checking buffer boundaries

SK0-004 CompTIA Server+ Certification Practice Exam Set 5

Which listed technique attempts to predict the likelihood of a threat occurrence and assigns monetary values in the event of a loss?

Options are :

  • Change management
  • Vulnerability management
  • Qualitative risk assessment
  • Quantitative risk assessment

Answer :Quantitative risk assessment

You work for an insurance company as their security administrator. You've noticed that there are a few accounts still active of employees who have been left the company for at least a year. You are worried that someone might attempt to access these accounts. What administrative control could be enabled to help prevent these accounts from remaining online and accessible after an employee leaves the company?

Options are :

  • Password complexity
  • Offboarding procedures
  • Onboarding procedures
  • Password expiration

Answer :Offboarding procedures

Olivia manages wireless security in her company and wants completely different WiFi access (ie different SSID, different security levels, different authentication methods) in different parts of the company. What's the best choice for Olivia to select in WAPs?

Options are :

  • Fat
  • Thin
  • Repeater
  • Full

Answer :Fat

CompTIA HT0-201 DHTI+ Certification Practice Exam Set 3

Which of the standards below was developed by the WiFi Alliance and is used to implement the requirements of IEEE 802.11i??

Options are :

  • NIC
  • WPA
  • WPA2
  • TKIP

Answer :WPA2

You're responsible for server room security. You're concerned about physical theft of computers. Of the following, which would best be able to detect theft or attempted theft?

Options are :

  • Motion-sensor activated cameras
  • Smart card access to the server rooms
  • Strong deadbolt locks for server rooms
  • Logging everyone who enters the server room

Answer :Motion-sensor activated cameras

Kaye works for a large insurance company and manages their cybersecurity. She's concerned about insiders and wants to be able to detect malicious activity but wants the detection process to be invisible to the attacker. What technology best fits these needs?

Options are :

  • Hybrid NIDS
  • Out-of-band NIDS
  • NIPS

Answer :Out-of-band NIDS

NEW! CompTIA A+ 2019 Cert. Core 2 (220-1002) Practice Tests Set 10

Derrick is a security administrator for a medium-sized mortgage company. He needs to verify that the network is using the most secure login/authentication scheme possible. Which of the following options is the best choice for that?

Options are :

  • Iris scanning
  • Fingerprint scanning
  • Multifactor authentication
  • Smart cards

Answer :Multifactor authentication

Choose the type of hypervisor known as "bare metal"?

Options are :

  • Type I
  • Type II
  • Type III
  • Type IV

Answer :Type I

Kevin manages security for a large university and has just successfully performed a threat analysis for the network. Based on past incidents and studies from similar setups, he has determined that the most prevalent threat is low-skilled attackers who wish to breach the system, simply because they can, for some low-level crime, or even changing a grade. Which term describes this attacker?

Options are :

  • Hacktivist
  • Amateur
  • Insider
  • Script kiddie

Answer :Script kiddie

220-701 A+ Essentials Certification Practice Exam Set 11

The web server administrator at your e-commerce company is concerned about someone using netcat to connect to the company web server to retrieve detailed information. What best describes this concern?

Options are :

  • Passive reconnaissance
  • Active reconnaissance
  • Banner grabbing
  • Vulnerability scanning

Answer :Banner grabbing

Matt manages database security for a university and he's concerned about ensuring that appropriate security measures are implemented. Which is the most important to database security?

Options are :

  • Password policies
  • Antivirus
  • EFS
  • Access control policies

Answer :Access control policies

You've been asked to conduct a penetration test for a small company and for the test, you were only given a company name, the domain name of their website, and the IP address of their gateway router. What describes the type of test?

Options are :

  • White-box test
  • External test
  • Black-box test
  • Threat test

Answer :Black-box test

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 10

Walter is working to implement Type II authentication. Which would be the best example of type II authentication?

Options are :

  • Strong passwords
  • Retinal scan
  • Smart cards
  • Timed one-time passwords

Answer :Smart cards

Which is the best choice for naming the account of John Smith - domain admin?

Options are :

  • dm_jsmith
  • jsmithAdmin
  • AdministratorSmith
  • jsmith

Answer :jsmith

You have an email that you are sending to a friend. You want to ensure it retains its integrity during transit, so you decide to digitally sign the email. When using a PKI system, what is used to encrypt the hash digest of the email to create a digital signature?

Options are :

  • CER
  • Public key
  • Shared key
  • Private key

Answer :Private key

CompTIA HT0-201 DHTI+ Certification Practice Exam Set 6

Josh manages security at a power plant. The facility is sensitive, and security is very important. He would like to incorporate two-factor authentications with physical security. Which of the options below is the best way to meet this requirement?

Options are :

  • Smart cards
  • A mantrap with a smart card at one door and a pin keypad at the other door
  • A mantrap with video surveillance
  • A fence with smart card gate access

Answer :A mantrap with a smart card at one door and a pin keypad at the other door

Dawn is a network administrator where the company network is segmented into zones of high security, medium security, low security, and the DMZ. She's concerned about external intruders and would like to install a honeypot. Which is the most important zone to put the honeypot in?

Options are :

  • High security
  • Medium security
  • Low security
  • DMZ

Answer :DMZ

Choose an example of PHI?

Options are :

  • Passport number
  • Criminal record
  • Fingerprints
  • Name of school attended

Answer :Fingerprints

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 25

Why might it not be advisable to conduct penetration tests on your corporate network?

Options are :

  • It can be disruptive for the business activities
  • It is able to measure and authenticate the efficiency of a company's defensive mechanisms
  • It's able to find known and unknown hardware or software weaknesses
  • It permits the exploration of real risks and gives them a vivid picture of the company's IT infrastructure security posture at any given time

Answer :It can be disruptive for the business activities

Michael is analyzing strange behavior by some of the computers on his network. He believes the machines contain some malware. The symptoms include strange behavior that continues even if they boot to a Linux Live CD. What is the most probable cause?

Options are :

  • Ransomware
  • Boot sector virus
  • Rootkit
  • Keylogger

Answer :Boot sector virus

Courtney manages data security on BYOD and COPE devices. She's specifically concerned about the data being exposed should a device be lost or stolen. Which item would the best to alleviate this concern?

Options are :

  • Geofencing
  • Screen lock
  • GPS tagging
  • Device encryption

Answer :Device encryption

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 4

Your security policy is set to include system testing and security awareness training guidelines. Which of the following types of control is this?

Options are :

  • Detective technical control
  • Preventative technical control
  • Detective administrative control
  • Preventative administrative control

Answer :Preventative administrative control

Jeff is the network administrator and sometimes needs to run a packet sniffer so he can view the network traffic. He would like to find a well-known packet sniffer that works on Linux. Which of the following is the best choice?

Options are :

  • Ophcrack
  • Nmap
  • Nessus
  • Tcpdump

Answer :Tcpdump

Rachel manages security for a small bank and has a firewall at the gateway as well as one at each network segment. Each firewall logs all accepted and rejected traffic. Rachel checks each of these logs regularly. What's the first step that should be taken to improve this firewall configuration?

Options are :

  • Integrate with SIEM
  • Add a honeypot
  • Integrate with AD
  • Add a honeynet

Answer :Integrate with SIEM

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 1

Laura manages DLP for a large company where some employees have COPE and some have BYOD. What DLP issue could these devices present?

Options are :

  • COPE devices can be used as a USB OTG resource
  • BYOD devices can be used as a USB OTG resource
  • COPE and BYOD devices can be used as a USB OTG resource
  • Only jailbroken COPE or BYOD device can be used as a USB OTG resource

Answer :COPE and BYOD devices can be used as a USB OTG resource

You work for a company that hired a pen testing firm to test the network. For the test, you gave them details on operating systems you use, applications you run and network devices. What describes this type of test?

Options are :

  • White-box test
  • External test
  • Black-box test
  • Threat test

Answer :White-box test

Grady is seeking access control methods that enforce authorization rules by the OS. Users cannot override authentication or access control policies. Which of the following best suits these needs?

Options are :

  • DAC
  • MAC
  • RBAC
  • ABAC

Answer :MAC

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 4

The company you work for is considering moving its email server to a hosting company. This will help reduce the cost of hardware and server administration at your local site. Which document formally states the reliability and recourse if reliability isn't met?

Options are :

  • MOU
  • SLA
  • ISA
  • BPA

Answer :SLA

Your company has implemented a clean desk policy and you were asked to secure physical documents every night. What is the best solution?

Options are :

  • Department door lock
  • Locking cabinets and drawers
  • Proximity card
  • Onboarding

Answer :Locking cabinets and drawers

Jack manages security devices in his network. He's implemented a robust NIDS in his network, however, on two occasions the NIDS has missed a breach. What condition does this describe?

Options are :

  • False negative
  • Port blocking
  • SPI
  • False positive

Answer :False negative

CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Set 4

Natalie is responsible for the security of web servers and is configuring the WAF to allow only encrypted traffic to and from the web server, including from administrators using the command-line interface. What should she do?

Options are :

  • Open port 80 and 23, block port 443
  • Open port 443 and 23, block port 80
  • Open port 443 and 22 and block 80 and 23
  • Open port 443 and block all other ports

Answer :Open port 443 and 22 and block 80 and 23

Laura manages the physical security for her company. She's especially concerned about an attacker driving a vehicle into the building. Which option below would protect against this threat?

Options are :

  • A gate
  • Bollards
  • A security guard on duty
  • Security cameras

Answer :Bollards

Name a process of deleting data by sending an eraser to clear the instruction in an address of nonvolatile memory.

Options are :

  • Data-in-transit
  • Data-over-the-network
  • Data-in-use
  • Data-at-rest

Answer :Data-at-rest

220-902 CompTIA A+ Certification Practice Exam Set 1

Of the listed items, which can be considered as a single point of failure?

Options are :

  • Failover
  • A cluster
  • Load balancing
  • A configuration

Answer :A configuration

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 7

Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected setup PIN to exploit the WAP and recover the WPA2 password. What type of attack is this?

Options are :

  • Evil twin
  • Rogue WAP
  • IV attack
  • WPS attack

Answer :WPS attack

Josh is responsible for creating new accounts for company network use. What is the most important thing to keep in mind for this process?

Options are :

  • Password length
  • Password complexity
  • Password age
  • Least privileges

Answer :Least privileges

From the list below, choose the type of attack that exploits the trust of a website for an authenticated user to attack the website by spoofing requests from the trusted user:

Options are :

  • Cross-site scripting
  • Cross-site request forgery
  • Bluejacking
  • Evil twin

Answer :Cross-site request forgery

CompTIA JK0-801 A+ Networking & PC Hardware Practice Exam Set 7

Of the following standards, which one support WPA2 but not WEP or WPA?

Options are :

  • 802.11a
  • 802.11b
  • 802.11i
  • 802.11n

Answer :802.11i

Jace manages security at the Ford Company. Lately, he's noticed there have been twenty new employee accounts created and assigned into the default group for the network. He's noticed eight of these have privileges that aren't required for their job task. Which security principle is the best way to avoid this problem in the future?

Options are :

  • Least privileges
  • Separation of duties
  • Acceptable Use Policy
  • Weakest link

Answer :Least privileges

Which of the following device concepts limit access to systems from outside users while protecting those inside the LAN?

Options are :

  • DMZ
  • VLAN
  • Router
  • Guest network

Answer :DMZ

CT0-101 Convergence+ Certification Practice Exam Set 5

Of the listed users, which is a role-based position that should receive training on how to manage particular systems?

Options are :

  • Users
  • Privileged users
  • Executive users
  • System owners

Answer :System owners

In asymmetric encryption, what is used to decrypt a file that was encrypted using a private key?

Options are :

  • Private key
  • Public key
  • Message digest
  • Ciphertext

Answer :Public key

Amy found netcat installed on an employee's computer, but the employee isn't authorized to have netcat. What security concern is presented by this utility?

Options are :

  • It is a password cracker
  • It is a packet sniffer
  • It is a network communication utility
  • It is a DoS tool

Answer :It is a network communication utility

220-801 CompTIA A+ Certification Practice Exam Set 5

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions