JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 1

An application programmer at a company conducts security assessments and reports findings to senior management. Which of the following principles does this scenario violate? 


Options are :

  • Least privilege
  • Job rotation
  • Vulnerability assessment
  • Separation of duties (Correct)

Answer : Separation of duties

Which of the following tools will allow a technician to detect devices and associated IP addresses on the network? 


Options are :

  • Protocol analyzers
  • Network intrusion detection software
  • Network mapping software (Correct)
  • Port scanner

Answer : Network mapping software

A security administrator wants to prevent corporate users from being infected with viruses from flash based advertisements while using web browsers at work. Which of the following could be used to mitigate this threat? 


Options are :

  • Content filter (Correct)
  • Protocol analyzer
  • Firewall
  • IDS

Answer : Content filter

Which of the following should a technician run to find user accounts that can be easily compromised? 


Options are :

  • Nessus
  • John the Ripper (Correct)
  • SNORT
  • NMAP

Answer : John the Ripper

A user reports that the spreadsheet they use for the department will not open. The spreadsheet is located on a server that was recently patched. Which of the following logs would the technician review FIRST? 


Options are :

  • Antivirus
  • Firewall
  • Access (Correct)
  • DNS

Answer : Access

Purchasing insurance on critical equipment is an example of which of the following types of risk mitigation techniques? 


Options are :

  • Risk avoidance
  • Risk transfer (Correct)
  • Risk reduction
  • Risk retention

Answer : Risk transfer

Which of the following is an example of data obfuscation within a data stream? 


Options are :

  • Fuzzing
  • Cryptography (Correct)
  • Steganography
  • Hashing

Answer : Cryptography

Mandatory Access Control (MAC) allows:


Options are :

  • access associated with the classification of data. (Correct)
  • rights to be assigned by the data owner.
  • access rights indicated by the role of the individual
  • a system administrator to centralize policy

Answer : access associated with the classification of data.

Which of the following is an authentication method that uses symmetric key encryption and a key distribution center? 


Options are :

  • 802.1x
  • Kerberos (Correct)
  • 802.1x
  • MS-CHAP

Answer : Kerberos

Which of the following provides EMI protection? 


Options are :

  • Grounding
  • Anti-static wrist straps (Correct)
  • UTP
  • STP

Answer : Anti-static wrist straps

The administrator needs to require all users to use complex passwords. Which of the following would be the BEST way to do this? 


Options are :

  • Set a local password policy on each workstation and server
  • Post a memo detailing the requirement of the new password complexity requirements
  • Set a group policy to force password changes
  • Set a domain password policy (Correct)

Answer : Set a domain password policy

Which of the following situations applies to disaster recovery exercises? 


Options are :

  • Vulnerability scans should be performed after each exercise
  • Procedures should be updated after each exercise. (Correct)
  • Separation of duties should be implemented after each exercise.
  • Passwords should be changed after each exercise.

Answer : Procedures should be updated after each exercise.

Which of the following would be used to eliminate the need for an administrator to manually configure passwords on each network device in a large LAN? 


Options are :

  • RADIUS (Correct)
  • RAS
  • IPSec VPN
  • OVAL

Answer : RADIUS

Which of the following forensic artifacts is MOST volatile?   


Options are :

  • Network topology
  • CD-ROM
  • Random access memory
  • File system (Correct)

Answer : File system

Shielded communications media is MOST often used to prevent electrical emanations from being detected and crosstalk between which of the following? 


Options are :

  • Networks
  • Cables (Correct)
  • VPNs
  • VLANs

Answer : Cables

Centrally authenticating multiple systems and applications against a federated user database is an example of:   


Options are :

  • access control list.
  • smart card
  • single sign-on. (Correct)
  • common access card.

Answer : single sign-on.

A user wishes to encrypt only certain files and folders within a partition. Which of the following methods should a technician recommend?   


Options are :

  • BitLocker
  • Full disk
  • EFS (Correct)
  • Partition encryption

Answer : EFS

The accounting group, clinical group and operations group only have access to their own applications. The company often needs auditors to have access to all three groups' applications with little notice. Which of the following would simplify the process of granting auditors permissions to all the applications? 


Options are :

  • Create an auditors group and add each of the accounting, clinical and operations groups to the auditors group
  • Create an auditors group and merge the members of the accounting, clinical and operations groups
  • Create an auditors group and add each user to the accounting, clinical and operations groups individually
  • Create an auditors group and add the group to each of the accounting, clinical and operations groups (Correct)

Answer : Create an auditors group and add the group to each of the accounting, clinical and operations groups

The president of the company is trying to get to their bank's website, and the browser is displaying that the web page is being blocked by the system administrator. Which of the following logs would the technician review? 


Options are :

  • DNS
  • System
  • Content filter (Correct)
  • Performance

Answer : Content filter

Which of the following helps prevent a system from being fingerprinted?   


Options are :

  • Personal firewall (Correct)
  • OS patching
  • Anti-spam software
  • Complex passwords

Answer : Personal firewall

A security administrator notices an unauthorized vehicle roaming the area on company grounds. The security administrator verifies that all network connectivity is up and running and that no unauthorized wireless devices are being used to authenticate other devices; however, the administrator does notice an unusual spike in bandwidth usage. This is an example of which of the following attacks? 


Options are :

  • War driving (Correct)
  • Rogue access point
  • Blue snarfing
  • Evil twin

Answer : War driving

Which of the following malicious programs compromises system security by exploiting system access through a virtual backdoor? 


Options are :

  • Adware
  • Spam
  • Trojan (Correct)
  • Virus

Answer : Trojan

Biometrics is an example of which of the following type of user authentication? 


Options are :

  • Something the user knows
  • Something the user is (Correct)
  • Something the user does
  • Something the user has

Answer : Something the user is

A security administrator needs to implement a wireless system that will only be available within a building. Which of the following configurations can the administrator modify to achieve this? (Select TWO).

A. Proper AP placement

B. Disable SSID broadcasting

C. Use CCMP

D. Enable MAC filtering

E. Reduce the power levels   


Options are :

  • C,D
  • B,E
  • A,B
  • A,D (Correct)

Answer : A,D

After completing a forensic image of a hard drive, which of the following can be used to confirm data integrity?   


Options are :

  • Chain of custody
  • AES256 encryption
  • SHA512 hash (Correct)
  • Image compression

Answer : SHA512 hash

Which of the following characteristics distinguishes a virus from a rootkit, spyware, and adware?   


Options are :

  • Popup displays
  • Process hiding
  • Self-replication (Correct)
  • Eavesdropping

Answer : Self-replication

Which of the following is a best practice when securing a switch from physical access?   


Options are :

  • Disable unnecessary accounts
  • Print baseline configuration
  • Enable access lists
  • Disable unused ports (Correct)

Answer : Disable unused ports

Which of the following BEST describes where L2TP is used? 


Options are :

  • Border gateway protocol encryption
  • VPN encryption (Correct)
  • Default gateway encryption
  • Authenticate users using CHAP

Answer : VPN encryption

Which of the following uses tickets to identify users to the network? 


Options are :

  • TACACS+
  • RADIUS
  • Kerberos (Correct)
  • LDAP

Answer : Kerberos

Which of the following is an example of implementing security using the least privilege principle? 


Options are :

  • Non-repudiation
  • Availability (Correct)
  • Integrity
  • Confidentiality

Answer : Availability

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions