JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 4

The security administrator needs to determine whether common words and phrases are being used as passwords on the company server. Which of the following attacks would MOST easily accomplish this task?   


Options are :

  • NTLM hashing
  • Dictionary (Correct)
  • Brute force
  • Encyclopedia

Answer : Dictionary

SY0-401 CompTIA Security+ Certification Practice Exam Set 10

Which of the following are used by security companies to discover the latest Internet attacks? 


Options are :

  • NIPS
  • Port scanner
  • Firewall
  • Honeypot (Correct)

Answer : Honeypot

A user wants to send personally identifiable information to the security office via email, so they can perform a background check. Which of the following should be used to send the information to the security office? 


Options are :

  • Encryption (Correct)
  • Digital signature
  • Level of importance
  • Signature line

Answer : Encryption

Which of the following is performed during a security assessment? 


Options are :

  • Determine the extent to which controls are implemented correctly (Correct)
  • Remediate the machines with incorrectly configured controls.
  • Calculate the cost of bringing the controls back into compliance.
  • Quarantine the machines that have no controls in place.

Answer : Determine the extent to which controls are implemented correctly

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 14

A security administrator wants to ensure that only authorized personnel are able to gain entry into a secure area. There is currently no physical security other than a badge reader. Which of the following would MOST likely be installed to regulate right of entry?   


Options are :

  • Security alarms
  • Video surveillance
  • Proximity readers (Correct)
  • Access list

Answer : Proximity readers

A port scan of a network identified port 25 open on an internal system. Which of the following types of traffic is this typically associated with? 


Options are :

  • Web traffic
  • File sharing traffic
  • Network management traffic
  • Mail traffic (Correct)

Answer : Mail traffic

Which of the following asymmetric algorithms was designed to provide both encryption and digital signatures? 


Options are :

  • RSA (Correct)
  • Diffie-Hellman
  • SHA
  • DSA

Answer : RSA

JK0-019 CompTIA E2C Network + Certification Exam Set 2

Which of the following is commonly used to secure HTTP and SMTP traffic?   


Options are :

  • TLS (Correct)
  • SHA
  • SFTP
  • SCP

Answer : TLS

Which of the following is the security concept that describes a user who only has enough access to complete their work?   


Options are :

  • Explicit allow
  • Least privilege (Correct)
  • Single sign-on
  • Implicit deny

Answer : Least privilege

Hooking processes and erasing logs are traits of which of the following? 


Options are :

  • Rootkit (Correct)
  • Cross-site scripting
  • Spam
  • Buffer overflow

Answer : Rootkit

CompTIA Security+ Cert. (SY0-501): Practice Tests 2019 Set 6

Which of the following security precautions needs to be implemented when securing a wireless network? (Select THREE) A. Enable data encryption on all wireless transmissions using WPA2. B. Enable the lowest power setting necessary to broadcast to the targeted range. C. Enable the highest power setting possible to make sure the broadcast reaches the targeted range. D. Enable data encryption on all wireless transmissions using WEP. E. Authentication should take place using a pre-shared key (PSK) of no more than six characters.  F. Enable the ability to verify credentials on an authentication server.   


Options are :

  • A,B,F (Correct)
  • A,C,D
  • C,D,E
  • A,B,C

Answer : A,B,F

Which of the following encryption schemes can be configured as the LEAST secure? 


Options are :

  • Twofish
  • DES (Correct)
  • 3DES
  • RC4

Answer : DES

A technician notices that unauthorized users are connecting to a wireless network from outside of the building. Which of the following can BEST be implemented to mitigate this issue?   


Options are :

  • The wireless output range can be reduced (Correct)
  • Change the SSID
  • Install CAT6 network cables
  • The wireless router needs to be replaced

Answer : The wireless output range can be reduced

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 2

An administrator has discovered that regular users are logging into a stand-alone computer and editing files they should have read-only access to. Which of the following should the administrator investigate FIRST? 


Options are :

  • Users installing worms under their own accounts to mine data.
  • Users creating new accounts with full control to the files.
  • Users remotely connecting from their workstation with administrator privileges.
  • Users escalating their privileges using an administrator account (Correct)

Answer : Users escalating their privileges using an administrator account

When disposing of old or damaged computer systems, which of the following is the primary security concern? 


Options are :

  • Confidentiality of proprietary information (Correct)
  • Integrity of company HR information
  • Adherence to local legal regulations
  • Compliance with industry best practices

Answer : Confidentiality of proprietary information

Which of the following is a primary effect of allowing P2P connections on a network? 


Options are :

  • Possible storage of illegal materials (Correct)
  • Input validation on web applications
  • Tracking cookies on the website
  • Increased amount of spam

Answer : Possible storage of illegal materials

CompTIA JK0-015 E2C Security+ Certification Practice Test Set 13

Which of the following organizational disaster recovery types would provide a building and network equipment but not current application data?   


Options are :

  • Cold site
  • Hot site
  • Field site
  • Warm site (Correct)

Answer : Warm site

Conducting periodic user rights audits can help an administrator identity: 


Options are :

  • users who can view confidential information. (Correct)
  • unauthorized network services.
  • new user accounts that have been created
  • users who are concurrently logged in under different accounts.

Answer : users who can view confidential information.

A large amount of continuous small transmissions are originating from multiple external hosts to the corporate web server, which is also inaccessible to users. Which of the following attacks is MOST likely the cause? 


Options are :

  • DNS poisoning
  • DoS
  • DDoS (Correct)
  • Spoofing

Answer : DDoS

CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 18

An employee is not able to receive email from a specific user at a different organization; however, they can receive emails from other users. Which of the following would the administrator MOST likely check to resolve the user's issue? 


Options are :

  • Spam folder settings (Correct)
  • Browser pop-up settings
  • The local firewall settings
  • User local antivirus settings

Answer : Spam folder settings

Which of the following BEST identifies the sensitivity of a document? 


Options are :

  • Access control list
  • Information classification (Correct)
  • Metadata
  • Risk transference

Answer : Information classification

Which of the following can be a risk of consolidating servers onto a single virtual host? 


Options are :

  • Environmental control
  • Non-repudiation
  • Data emanation
  • Availability (Correct)

Answer : Availability

CompTIA Security+ Certification (SY0-501)

Which of the following is a security best practice that allows a user to have one ID and password for all systems? 


Options are :

  • Trusted OS
  • SSO (Correct)
  • Token
  • PIV

Answer : SSO

An email server appears to be running with an increased load. Which of the following can be used to compare historical performance?   


Options are :

  • Systems monitor
  • Protocol analyzer
  • Performance monitor
  • Performance baselines (Correct)

Answer : Performance baselines

A technician needs to ensure that all major software revisions have been installed on a critical network machine. Which of the following must they install to complete this task? 


Options are :

  • HIDS
  • Hotfixes
  • Service packs (Correct)
  • Patches

Answer : Service packs

CompTIA Security+ Cert. (SY0-501): Practice Tests 2019 Set 2

A vulnerable service is required between two systems on a network. Which of the following should an administrator use to prevent an attack on that service from outside the network?   


Options are :

  • Proxy server
  • HIDS
  • Firewall (Correct)
  • NIDS

Answer : Firewall

A security administrator needs to determine if an assistant's workstation is sending out corporate information. Which of the following could be used to review the assistant's network traffic? 


Options are :

  • Systems monitoring
  • Performance baselining
  • Protocol analysis (Correct)
  • Performance monitoring

Answer : Protocol analysis

A security administrator wants to detect and prevent attacks at the network perimeter. Which of the following security devices should be installed to address this concern?   


Options are :

  • IDS
  • NDS
  • NIPS (Correct)
  • HIPS

Answer : NIPS

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 4

A technician needs to setup a secure room to enable a private VTC system. Which of the following should be installed to prevent devices from listening to the VTC?  A


Options are :

  • MD5 hashing
  • HIDS
  • HVAC
  • Shielding (Correct)

Answer : Shielding

An administrator would like to update a network machine with a number of vendor fixes concurrently. Which of the following would accomplish this with the LEAST amount of effort? 


Options are :

  • Install a patch.
  • Install a new version of the program
  • Install a hotfix.
  • Install a service pack (Correct)

Answer : Install a service pack

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions