JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 2

An attacker captures valid wireless traffic in hopes of transmitting it repeatedly to generate enough traffic to discover the encryption key. Which of the following is the attacker MOST likely using? 

Options are :

  • Replay attack
  • Blue jacking
  • War driving
  • DNS poisoning

Answer : Replay attack

CompTIA MB0-001 Mobility+ Certification Practice Exam Set 1

A security administrator responds to a report of a web server that has been compromised. The security administrator observes the background has been changed to an image of an attacker group. Which of the following would be the FIRST step in the incident response process? 

Options are :

  • Run an antivirus scan
  • Print a copy of the background
  • Disable the network connection
  • Power down the server

Answer : Disable the network connection

Which of the following is a preventative physical security measure? 

Options are :

  • Video surveillance
  • Physical access log
  • External lighting
  • Access control system

Answer : Access control system

Attackers may be able to remotely destroy critical equipment in the datacenter by gaining control over which of the following systems? 

Options are :

  • Physical access control
  • HVAC
  • Video surveillance
  • Packet sniffer

Answer : HVAC

CompTIA HT0-201 DHTI+ Certification Practice Exam Set 6

In the event of a disaster resulting in the loss of their data center, a company had determined that they will need to be able to be back online within an hour or two, with all systems being fully up to date. Which of the following would BEST meet their needs? 

Options are :

  • A warm backup site
  • Off-site storage of backup tapes
  • A hot backup site
  • A cold backup site

Answer : A hot backup site

A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?   

Options are :

  • SNMP
  • 802.1X
  • RTP
  • IPSec

Answer : IPSec

The BEST location for a spam filter is   

Options are :

  • behind the firewall.
  • on the local LAN.
  • on a proxy server
  • in front of the mail relay server.

Answer : in front of the mail relay server.

CompTIA Advanced Security Practitioner(CASP+) Practice Exams Set 4

Which of the following environmental variables reduces the potential for static discharges? 

Options are :

  • EMI
  • Humidity
  • UPS
  • Temperature

Answer : Humidity

Risk can be managed in the following ways EXCEPT 

Options are :

  • mitigation
  • elimination.
  • transference.
  • acceptance.

Answer : mitigation

Which of the following contains a database of users and passwords used for authentication? 

Options are :

  • SAM
  • TPM
  • CHAP
  • DNS

Answer : SAM

CAS-001 CompTIA Advanced Security Practitioner Practice Exam Set 8

Which of the following measures ensures unauthorized users cannot access a WAP in a user's home? 

Options are :

  • Change the administrator password on the computer
  • Turn off the computers when not in use
  • Proper WAP placement
  • Set the SSID to hidden

Answer : Set the SSID to hidden

Which of the following is a malicious program that infects a host computer and has the ability to replicate itself?   

Options are :

  • Spam
  • Spyware
  • Virus
  • Rootkit

Answer : Virus

Which of the following BEST represents why a system administrator should download security patches from the manufacturer's website directly? 

Options are :

  • Maintain configuration baseline
  • Ensure patches are up-to-date
  • Ensure integrity of the patch
  • Implement OS hardening

Answer : Ensure integrity of the patch

BR0-003 CompTIA A+ 2009 Edition Bridge Practice Exam Set 2

Which of the following solutions would an administrator MOST likely perform in order to keep upto-date with various fixes on different applications? 

Options are :

  • Different security templates
  • Patch management
  • Service pack installation
  • Browser hotfixes

Answer : Patch management

Which of the following practices improves forensic analysis of logs? 

Options are :

  • Ensuring switches have a strong management password.
  • Ensuring the proper time is set on all systems.
  • Ensuring SNMP is enabled on all systems.
  • Ensuring encryption is deployed to critical systems

Answer : Ensuring the proper time is set on all systems.

Which of the following devices is MOST likely to be installed to prevent malicious attacks? 

Options are :

  • VPN concentrator
  • Firewall
  • NIDS
  • Protocol analyzer

Answer : Firewall

CompTIA 220-801 A+ Advanced Certification Practice Exam Set 7

Which of the following tools provides the MOST comprehensive view of the network's security? 

Options are :

  • Network anomaly detection
  • Network mapping program
  • Vulnerability assessment
  • Penetration test

Answer : Penetration test

Which of the following would a security administrator use to diagnose network issues? 

Options are :

  • Protocol analyzer
  • Proxy
  • Host-based firewall
  • Gateway

Answer : Protocol analyzer

Which of the following should be implemented on a mobile phone to help prevent a conversation from being captured? 

Options are :

  • Voice encryption
  • GPS tracking
  • Sniffer
  • Device encryption

Answer : Voice encryption

SY0-401 CompTIA Security+ Certification Practice Exam Set 10

Which of the following protocols uses UDP port 69 by default?   

Options are :

  • TFTP
  • Kerberos
  • SSH
  • DNS

Answer : TFTP

Which of the following concepts is applied FIRST when a user logs into a domain? 

Options are :

  • Authorization
  • Virealization
  • Identification
  • Non-repudiation

Answer : Identification

Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch? 

Options are :

  • WWN spoofing
  • ARP poisoning
  • DNS poisoning
  • MAC spoofing

Answer : MAC spoofing

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 19

Which of the following has the capability to perform on board cryptographic functions? 

Options are :

  • Smart card
  • ACL
  • RFID badge
  • Proximity badge

Answer : Smart card

While responding to a confirmed breach of the organization's web server, the security administrator determines the source of the attack was from a rival organization's IP address range. Which of the following should the security administer do with this information?   

Options are :

  • Notify the Help Desk
  • Notify ICANN
  • Notify management
  • Notify the rival organization's IT department

Answer : Notify management

Which of the following has a programmer MOST likely failed to consider if a user entering improper input is able to compromise the integrity of data? 

Options are :

  • Data formatting
  • SDLM
  • Input validation
  • Error handling

Answer : Input validation

220-702 CompTIA A+ Practical Application Practice Exam Set 1

An employee keeps getting pop-ups from a program on their computer stating it blocked an attacking IP address. Which of the following security applications BEST explains this behavior? 

Options are :

  • Antivirus
  • Personal firewall
  • Anti-spam
  • Pop-up blocker

Answer : Personal firewall

Which of the following attacks involves sending unsolicited contact information to Bluetooth devices configured in discover mode?   

Options are :

  • Blue jacking
  • War driving
  • Bluesnarfing
  • Impersonation

Answer : Blue jacking

A Maintenance Manager requests that a new group be created for a new development project, concerning power distribution, in order to email and setup conference meetings to the whole project team. Which of the following group types would need to be created?   

Options are :

  • Distribution
  • Default power users
  • Security
  • Restricted group

Answer : Distribution

BR0-002 CompTIA Network + Bridge Practice Exam Set 4

A user reports that a web browser stopped working after it was updated. Which of the following BEST describes a probable cause of failure? 

Options are :

  • The browser was previously compromised and corrupted during the update.
  • Anti-spyware is preventing the browser from accessing the network.
  • A faulty antivirus signature has identified the browser as malware.
  • A network based firewall is blocking the browser as it has been modified.

Answer : A network based firewall is blocking the browser as it has been modified.

Which of the following defines the role of a root certificate authority (CA) in PKI? 

Options are :

  • The CA is the trusted root that issues certificates
  • The root CA is used to encrypt email messages to prevent unintended disclosure of data
  • The CA stores the user's hash value for safekeeping.
  • The root CA is the recovery agent used to encrypt data when a user's certificate is lost.

Answer : The CA is the trusted root that issues certificates

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions