CompTIA SY0-401 Security Certification Practice Exam Set 1

The Chief Technology Officer (CTO) of a company, Ann, is putting together a hardware budget for the next 10 years. She is asking for the average lifespan of each hardware device so that she is able to calculate when she will have to replace each device. Which of the following categories BEST describes what she is looking for?


Options are :

  • MTBF
  • ALE
  • MTTF
  • MTTR

Answer :MTTF

CompTIA PenTest+ Certified for Cybersecurity Professionals Set 1

Which of the following is the GREATEST risk to a company by allowing employees to physically bring their personal smartphones to work?


Options are :

  • Installing soft token software to connect to the company's wireless network.
  • Increases the attack surface by having more target devices on the company's campus
  • Company cannot automate patch management on personally-owned devices.
  • Taking pictures of proprietary information and equipment in restricted areas.

Answer :Taking pictures of proprietary information and equipment in restricted areas.

A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion. Which of the following technologies would BEST be suited to accomplish this?


Options are :

  • Transport Encryption
  • Digital Signature
  • Steganography
  • Stream Encryption

Answer :Steganography

A system administrator is configuring a site-to-site VPN tunnel. Which of the following should be configured on the VPN concentrator during the IKE phase?


Options are :

  • RIPEMD
  • Diffie-Hellman
  • ECDHE
  • HTTPS

Answer :Diffie-Hellman

FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 9

A Security Officer on a military base needs to encrypt several smart phones that will be going into the field. Which of the following encryption solutions should be deployed in this situation?


Options are :

  • One-time pad
  • Elliptic curve
  • AES-256
  • 3DES

Answer :AES-256

Which of the following technologies would be MOST appropriate to utilize when testing a new software patch before a company-wide deployment?


Options are :

  • Virtualization
  • Redundancy
  • Cloud computing
  • Application control

Answer :Virtualization

A technician must configure a firewall to block external DNS traffic from entering a network. Which of the following ports should they block on the firewall?


Options are :

  • 143
  • 443
  • 53
  • 110

Answer :53

HT0-201 CEA- CompTIA DHTI+ Certification Practice Exam Set 5

A security team wants to establish an Incident Response plan. The team has never experienced an incident. Which of the following would BEST help them establish plans and procedures?


Options are :

  • Recovery procedures
  • Lessons learned
  • Table top exercises
  • Escalation procedures

Answer :Recovery procedures

Which of the following would verify that a threat does exist and security controls can easily be bypassed without actively testing an application?


Options are :

  • Port scanner
  • Vulnerability scan
  • Protocol analyzer
  • Penetration tes

Answer :Vulnerability scan

An administrator discovers the following log entry on a server: Nov 12 2013 00:23:45 httpd[2342]: GET /app2/prod/proc/process.php?input=change;cd%20../../../etc;cat%20shadow Which of the following attacks is being attempted?


Options are :

  • Command injection
  • Password attack
  • Buffer overflow
  • Cross-site scripting

Answer :Cross-site scripting

CompTIA Cloud Essentials Cert Exam Prep CL0-002 Set 4

Which of the following attack types is being carried out where a target is being sent unsolicited messages via Bluetooth?


Options are :

  • Bluejacking
  • Rogue tethering
  • Bluesnarfing
  • War chalking

Answer :Bluejacking

A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet. Which of the following should be used in the code? (Choose two.)


Options are :

  • Software code private key
  • OCSP
  • Escrowed keys
  • Remote server public key
  • SSL symmetric encryption key

Answer :OCSP SSL symmetric encryption key

A software development company needs to share information between two remote servers, using encryption to protect it. A programmer suggests developing a new encryption protocol, arguing that using an unknown protocol with secure, existing cryptographic algorithm libraries will provide strong encryption without being susceptible to attacks on other known protocols. Which of the following summarizes the BEST response to the programmer's proposal?


Options are :

  • The obscurity value of unproven protocols against attacks often outweighs the potential for introducing new vulnerabilities.
  • The newly developed protocol will only be as secure as the underlying cryptographic algorithms used.
  • New protocols often introduce unexpected vulnerabilities, even when developed with otherwise secure and tested algorithm libraries.
  • A programmer should have specialized training in protocol development before attempting to design a new encryption protocol.

Answer :New protocols often introduce unexpected vulnerabilities, even when developed with otherwise secure and tested algorithm libraries.

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 11

A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home offices and while traveling, and a high amount of wireless mobile use is expected. To protect the laptops while connected to untrusted wireless networks, which of the following would be the BEST method for reducing the risk of having the laptops compromised?


Options are :

  • OS hardening
  • MAC filtering
  • Application white-listing
  • Virtualization

Answer :OS hardening

Joe is exchanging encrypted email with another party. Joe encrypts the initial email with a key. When Joe receives a response, he is unable to decrypt the response with the same key he used initially. Which of the following would explain the situation?


Options are :

  • Out-of-band key exchange has taken place
  • An ephemeral key was used for one of the messages
  • A stream cipher was used for the initial email; a block cipher was used for the reply
  • Asymmetric encryption is being used

Answer :Asymmetric encryption is being used

A network operations manager has added a second row of server racks in the datacenter. These racks face the opposite direction of the first row of racks. Which of the following is the reason the manager installed the racks this way?


Options are :

  • To lower energy consumption by sharing power outlets
  • To maximize fire suppression capabilities
  • To create environmental hot and cold isles
  • To eliminate the potential for electromagnetic interference

Answer :To create environmental hot and cold isles

JK0-019 CompTIA E2C Network + Certification Exam Set 1

Recently several employees were victims of a phishing email that appeared to originate from the company president. The email claimed the employees would be disciplined if they did not click on a malicious link in the message. Which of the following principles of social engineering made this attack successful?


Options are :

  • Spamming
  • Authority
  • Social proof
  • Scarcity

Answer :Authority

Which of the following is the summary of loss for a given year?


Options are :

  • ARO
  • ALE
  • SLA
  • MTBF

Answer :ALE

An organization relies heavily on an application that has a high frequency of security updates. At present, the security team only updates the application on the first Monday of each month, even though the security updates are released as often as twice a week. Which of the following would be the BEST method of updating this application?


Options are :

  • Configure security control testing for the application.
  • Configure testing and automate patch management for the application
  • Configure a sandbox for testing patches before the scheduled monthly update
  • Configure a sandbox for testing patches before the scheduled monthly update.
  • Manually apply updates for the application when they are released.

Answer :Configure testing and automate patch management for the application

CD0-001 CDIA+ Certification Practice Exam Set 11

A supervisor in your organization was demoted on Friday afternoon. The supervisor had the ability to modify the contents of a confidential database, as well as other managerial permissions. On Monday morning, the database administrator reported that log files indicated that several records were missing from the database Which of the following risk mitigation strategies should have been implemented when the supervisor was demoted?


Options are :

  • Incident management
  • Monthly user rights reviews
  • Routine auditing
  • IT governance

Answer :Monthly user rights reviews

Anne, the Chief Executive Officer (CEO), has reported that she is getting multiple telephone calls from someone claiming to be from the helpdesk. The caller is asking to verify her network authentication credentials because her computer is broadcasting across the network. Which of the following types of attacks is this MOST likely?


Options are :

  • Impersonation
  • Scareware
  • Spim
  • Vishing

Answer :Vishing

Phishing emails frequently take advantage of high-profile catastrophes reported in the news. Which of the following principles BEST describes the weakness being exploited?


Options are :

  • Authority
  • Social proof
  • Scarcity
  • Intimidation

Answer :Social proof

220-702 CompTIA A+ Practical Application Practice Exam Set 2

A system administrator needs to implement 802.1x whereby when a user logs into the network, the authentication server communicates to the network switch and assigns the user to the proper VLAN. Which of the following protocols should be used?


Options are :

  • Kerberos
  • RADIUS
  • LDAP
  • MSCHAP

Answer :RADIUS

Joe, the security administrator, sees this in a vulnerability scan report: "The server 10.1.2.232 is running Apache 2.2.20 which may be vulnerable to a mod_cgi exploit." Joe verifies that the mod_cgi module is not enabled on 10.1.2.232. This message is an example of:


Options are :

  • a false positive.
  • a threat.
  • a false negative.
  • a risk.

Answer :a false positive.

A security guard has informed the Chief Information Security Officer that a person with a tablet has been walking around the building. The guard also noticed strange white markings in different areas of the parking lot. Which of the following types of attacks is the person attempting?


Options are :

  • Near field communication
  • War chalking
  • Jamming
  • Packet sniffing

Answer :War chalking

220-701 A+ Essentials Certification Practice Exam Set 1

Which of the following should identify critical systems and components?


Options are :

  • BCP
  • BPA
  • ITCP
  • MOU

Answer :BCP

CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 4

Ann, a security analyst, is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain. Which of the following tools would aid her to decipher the network traffic?


Options are :

  • Packet Analyzer
  • NETSTAT
  • NMAP
  • Vulnerability Scanner

Answer :NETSTAT

A portable data storage device has been determined to have malicious firmware. Which of the following is the BEST course of action to ensure data confidentiality?


Options are :

  • Format the device
  • Perform virus scan in the device
  • Re-image the device
  • Physically destroy the device

Answer :Physically destroy the device

Which of the following should be used to implement voice encryption?


Options are :

  • VDSL
  • VoIP
  • SRTP
  • SSLv3

Answer :SRTP

CompTIA HT0-201 DHTI+ Certification Practice Exam Set 2

A security administrator is developing training for corporate users on basic security principles for personal email accounts. Which of the following should be mentioned as the MOST secure way for password recovery?


Options are :

  • Utilizing CAPTCHA to avoid brute force attacks
  • Sending a PIN to a smartphone through text message
  • Use a different e-mail address to recover password
  • Utilizing a single question for password recovery

Answer :Sending a PIN to a smartphone through text message

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions