CompTIA SY0-401 Security Certification Practice Exam Set 6

A chief information security officer (CISO) is providing a presentation to a group of network engineers. In the presentation, the CISO presents information regarding exploit kits. Which of the following might the CISO present?


Options are :

  • Exploit kits are vulnerability scanners used by penetration testers
  • Exploit kits are WIFI scanning tools that can find new honeypots
  • Exploit kits are tools capable of taking advantage of multiple CVEs
  • Exploit kits are a new type of malware that allow attackers to control their computers

Answer :Exploit kits are tools capable of taking advantage of multiple CVEs

An administrator is implementing a new management system for the machinery on the company's production line. One requirement is that the system only be accessible while within the production facility. Which of the following will be the MOST effective solution in limiting access based on this requirement?


Options are :

  • Air Gap
  • MAC filter
  • Access control list
  • Firewall policy

Answer :Access control list

220-902 CompTIA A+ Certification Practice Exam Set 6

Joe, a security analyst, is attempting to determine if a new server meets the security requirements of his organization. As a step in this process, he attempts to identify a lack of security controls and to identify common misconfigurations on the server. Which of the following is Joe attempting to complete?


Options are :

  • Black box testing
  • Vulnerability scanning
  • Penetration testing
  • Black hat testing

Answer :Vulnerability scanning

The IT department has been tasked with reducing the risk of sensitive information being shared with unauthorized entities from computers it is saved on, without impeding the ability of the employees to access the internet. Implementing which of the following would be the best way to accomplish this objective?


Options are :

  • DLP
  • Pop-up blockers
  • Host-based firewalls
  • URL filtering

Answer :DLP

A company recently experienced several security breaches that resulted in confidential data being infiltrated form the network. The forensic investigation revealed that the data breaches were caused by an insider accessing files that resided in shared folders who then encrypted the data and sent it to contacts via third party email. Management is concerned that other employees may also be sending confidential files outside of the company to the same organization. Management has requested that the IT department implement a solution that will allow them to: Track access and sue of files marked confidential, provide documentation that can be sued for investigations, prevent employees from sending confidential data via secure third party email, identify other employees that may be involved in these activities. Which of the following would be the best choice to implement to meet the above requirements?


Options are :

  • Agent-based DLP software with correlations and logging enabled
  • Full disk encryption on all computers with centralized event logging and monitoring enabled
  • Web content filtering capable of inspe4cting and logging SSL traffic used by third party webmail providers
  • Host based firewalls with real time monitoring and logging enabled

Answer :Agent-based DLP software with correlations and logging enabled

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 21

A security administrator needs to implement a technology that creates a secure key exchange. Neither party involved in the key exchange will have pre-existing knowledge of one another. Which of the following technologies would allow for this?


Options are :

  • Blowfish
  • Diffie-Hellman
  • NTLM
  • CHAP

Answer :Diffie-Hellman

An administrator performs a risk calculation to determine if additional availability controls need to be in place. The administrator estimates that a server fails and needs to be replaced once every 2 years at a cost of $8,000. Which of the following represents the factors that the administrator would use to facilitate this calculation?


Options are :

  • ARO=0.5; SLE=$8,000; ALE=$4,000
  • ARO= 0.5; SLE= $4,000; ALE= $2,000
  • ARO=0.5; SLE= $4,000; ALE=$8,000
  • ARO=2; SLE= $4,000; ALE=$8,000

Answer :ARO=0.5; SLE=$8,000; ALE=$4,000

A recent online password audit has identified that stale accounts are at risk to brute force attacks. Which the following controls would best mitigate this risk?


Options are :

  • Account lockouts
  • Password complexity
  • Password length
  • Account disablement

Answer :Account lockouts

CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 5

An attacker unplugs the access point at a coffee shop. The attacker then runs software to make a laptop look like an access point and advertises the same network as the coffee shop normally does. Which of the following describes this type of attack?


Options are :

  • IV
  • Packet sniffing
  • Xmas
  • Evil twin

Answer :Evil twin

A company has had their web application become unavailable several times in the past few months due to increased demand. Which of the following should the company perform to increase availability?


Options are :

  • Configure the web server to detect race conditions and automatically restart the web services
  • Configure the firewall to work with the IPS to rate limit customer requests
  • Implement a load balancer to distribute traffic based on back end server utilization
  • Implement a web application firewall to prevent DDoS attacks

Answer :Implement a load balancer to distribute traffic based on back end server utilization

Joe, a security technician, is configuring two new firewalls through the web on each. Each time Joe connects, there is a warning message in the browser window about the certificate being untrusted. Which of the following will allow Joe to configure a certificate for the firewall so that firewall administrators are able to connect both firewalls without experiencing the warning message?


Options are :

  • Apply a single certificate obtained from a public certificate authority
  • Apply a permanent override to the certificate warning in the browser
  • Apply a self-signed certificate generated by each of the firewalls
  • Apply a wildcard certificate obtained from the company's certificate authority

Answer :Apply a self-signed certificate generated by each of the firewalls

CompTIA JK0-022 Security Cryptography Certification Exam Set 6

Which of the following BEST describes malware that tracks a user's web browsing habits and injects the attacker's advertisements into unrelated web pages? (Choose two.)


Options are :

  • Adware
  • Ransomware
  • Spyware
  • Backdoor
  • Logic bomb

Answer :Adware Spyware

A system administrator wants to prevent password compromises from offline password attacks. Which of the following controls should be configured to BEST accomplish this task? (Choose two.)


Options are :

  • Account lockouts
  • Password history
  • Password length
  • Password complexity
  • Password reuse

Answer :Account lockouts Password complexity

The key management organization has implemented a key escrowing function. Which of the following technologies can provide protection for the PKI's escrowed keys?


Options are :

  • TPM
  • OCSP
  • HSM
  • CRL

Answer :CRL

CompTIA CAS-002 Advanced Security Practitioner Certify Exam Set 1

An administrator receives a security alert that appears to be from one of the company's vendors. The email contains information and instructions for patching a serious flaw that has not been publicly announced. Which of the following can an employee use to validate the authenticity if the email?


Options are :

  • SSL certificate chain
  • Private key
  • Hashing algorithm
  • Ephemeral Key

Answer :Hashing algorithm

In the course of troubleshooting wireless issues from users, a technician discovers that users are connecting to their home SSIDs while at work. The technician scans but detects none of those SSIDs. The technician eventually discovers a rouge access point that spoofs any SSID request. Which of the following allows wireless use while mitigating this type of attack?


Options are :

  • Enable MAC filtering on the wireless access point
  • Disable automatic connection to known SSIDs.
  • Only connect to trusted wireless networks.
  • Configure the device to verify access point MAC addresses.

Answer :Configure the device to verify access point MAC addresses.

A Company transfers millions of files a day between their servers. A programmer for the company has created a program that indexes and verifies the integrity of each file as it is replicated between servers. The programmer would like to use the fastest algorithm to ensure integrity. Which of the following should the programmer use?


Options are :

  • SHA1
  • RIPEMD
  • DSA
  • MD5

Answer :MD5

CompTIA JK0-018 Security+ E2C Certified Practice Exam Set 11

A network administrator argues that WPA2 encryption is not needed, as MAC filtering is enabled on the access point. Which of the following would show the administrator that wpa2 is also needed?


Options are :

  • Flood access point with random mac addresses
  • DNS poison the access point
  • Deploy an evil twin with mac filtering
  • Sniff and clone a mac address

Answer :Sniff and clone a mac address

Given the following set of firewall rules: From the inside to outside allow source any destination any port any From inside to dmz allow source any destination any port tcp-80 From inside to dmz allow source any destination any port tcp-443 Which of the following would prevent FTP traffic from reaching a server in the DMZ from the inside network?


Options are :

  • Port forwarding
  • Implicit deny
  • Forwarding proxy
  • Policy routing

Answer :Implicit deny

Which of the following attacks initiates a connection by sending specially crafted packets in which multiple TCP flags are set to 1?


Options are :

  • Xmas
  • Smurf
  • Replay
  • Fraggle

Answer :Xmas

CompTIA 220-801 A+ Advanced Certification Practice Exam Set 2

A server crashes at 6 pm. Senior management has determined that data must be restored within two hours of a server crash. Additionally, a loss of more than one-hour worth of data is detrimental to the company's financial well-being. Which of the following is the RTO?


Options are :

  • 10:00 PM
  • 8:00 PM
  • 9:00 PM
  • 7:00 PM

Answer :8:00 PM

To mitigate the risk of intrusion, an IT Manager is concerned with using secure versions of protocols and services whenever possible. In addition, the security technician is required to monitor the types of traffic being generated. Which of the following tools is the technician MOST likely to use?


Options are :

  • Network analyzer
  • IPS
  • Audit Logs
  • Port scanne

Answer :Network analyzer

A risk assessment team is concerned about hosting data with a cloud service provider (CSP), which of the following findings would justify this concern?


Options are :

  • The CSP takes into account multinational privacy concerns
  • The CPS utilizes encryption for data at rest and in motion
  • The financial review indicates the company is a startup
  • SLA state service tickets will be resolved in less than 15 minutes

Answer :The CSP takes into account multinational privacy concerns

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 14

A classroom utilizes workstations running virtualization software for a maximum of one virtual machine per working station. The network settings on the virtual machines are set to bridged. Which of the following describes how the switch in the classroom should be configured to allow for the virtual machines and host workstation to connect to network resources?


Options are :

  • The maximum mac settings of the ports should be set to three
  • The maximum-mac settings of the ports should be set to zero
  • The maximum-mac settings of the ports should be set to one
  • The maximum-mac settings of the ports should be set to two

Answer :The maximum-mac settings of the ports should be set to zero

A company has several public conference room areas with exposed network outlets. In the past, unauthorized visitors and vendors have used the outlets for internet access. The help desk manager does not want the outlets to be disabled due to the number of training sessions in the conference room and the amount of time it takes to get the ports either patched in or enabled. Which of the following is the best option for meeting this goal?


Options are :

  • 802.1x
  • Port security
  • Loop protection
  • Flood guards

Answer :802.1x

A company has had several security incidents in the past six months. It appears that the majority of the incidents occurred on systems with older software on development workstations. Which of the following should be implemented to help prevent similar incidents in the future?


Options are :

  • Peer code review
  • Patch management
  • Application whitelisting
  • Host-based firewall

Answer :Patch management

CompTIA Cyber Security Analyst (CySA+) Practice Exams 2019 Set 10

A security administrator is using a software program to test the security of a wireless access point. After running the program for a few hours, the access point sends the wireless secret key back to the software program. Which of the following attacks is this an example of?


Options are :

  • IV
  • Replay
  • Deauth
  • WPS

Answer :Deauth

An administrator is implementing a security control that only permits the execution of allowed programs. Which of the following are cryptography concepts that should be used to identify the allowed programs? (Choose two.)


Options are :

  • Hashing
  • Digital signatures
  • Asymmetric encryption
  • OpenID

Answer :Hashing Digital signatures

A user, Ann, has been issued a smart card and is having problems opening old encrypted email. Ann published her certificates to the local windows store and to the global address list. Which of the following would still need to be performed?


Options are :

  • Setup the email security with her new certificates
  • Recover her old private certificate
  • Verify the correct email address is associated with her certificate
  • Reinstall her previous public certificate

Answer :Setup the email security with her new certificates

CompTIA N10-004 Network+ Certification Practice Test Set 4

Which of the following describes the implementation of PAT?


Options are :

  • A one to one persistent mapping between on private IP and one Public IP
  • Changing the priority of a TCP stream based on the source address
  • Translating the source and destination IPS, but not the source and destination ports
  • Associating multiple public IP addresses with one private address

Answer :Associating multiple public IP addresses with one private address

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions