JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 6

An administrator wants to crack passwords on a server with an account lockout policy. Which of the following would allow this without locking accounts? 


Options are :

  • Try guessing passwords slow enough to reset the bad count interval.
  • Try only real dictionary words.
  • Try guessing passwords with brute force.
  • Copy the password file offline and perform the attack on it. (Correct)

Answer : Copy the password file offline and perform the attack on it.

SY0-401 CompTIA Security+ Certification Practice Exam Set 7

Which of the following tools can execute a ping sweep? 


Options are :

  • Anti-virus scanner
  • Protocol analyzer
  • Network mapper (Correct)
  • Password cracker

Answer : Network mapper

Which of the following is BEST used to change common settings for a large number of deployed computers? 


Options are :

  • Configuration baselines
  • Group policies (Correct)
  • Security templates
  • Hotfixes

Answer : Group policies

Which of the following should a technician deploy to detect malicious changes to the system and configuration? 


Options are :

  • Firewall
  • Pop-up blocker
  • Anti-spyware
  • File integrity checker (Correct)

Answer : File integrity checker

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 5

Which of the following transmission types would an attacker most likely use to try to capture data packets?   


Options are :

  • Bluesnarfing
  • Wireless (Correct)
  • Shielded twisted pair
  • Fiberoptic

Answer : Wireless

Which of the following ports would need to be open to allow TFTP by default? 


Options are :

  • 339
  • 110
  • 69 (Correct)
  • 137

Answer : 69

Which of the following is an example of two factor authentication?   


Options are :

  • Fingerprint and retina scan
  • Smart card and PIN (Correct)
  • PIN and password
  • Smart card and token

Answer : Smart card and PIN

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 2

Which of the following tools was created for the primary purpose of reporting the services that are open for connection on a networked workstation? 


Options are :

  • Port scanner (Correct)
  • Protocol analyzer
  • Password crackers
  • Vulnerability scanner

Answer : Port scanner

Which of the following is MOST likely to be an issue when turning on all auditing functions within a system?   


Options are :

  • Too many available log aggregation tools
  • Flooding the network with all of the log information
  • Too much information to review (Correct)
  • Lack of support for standardized log review tools

Answer : Too much information to review

Which of the following can increase risk? (Select TWO] A. Vulnerability B. Mantrap C. Configuration baselines D. Threat source E. Mandatory vacations   


Options are :

  • C,D
  • A,D (Correct)
  • A,B
  • B,E

Answer : A,D

SY0-401 CompTIA Security+ Certification Practice Exam Set 6

The security administrator needs to make a change in the network to accommodate a new remote location. The new location will be connected by a serial interface, off the main router, through a commercial circuit. This remote site will also have traffic completely separated from all other traffic. Which of the following design elements will need to be implemented to accommodate the new location? 


Options are :

  • The current IP scheme needs to be subnetted. (Correct)
  • VLANs need to be added on the switch but not the router.
  • The switch needs to be virtualized and a new DMZ needs to be created
  • The NAT needs to be re-configured to allow the remote location.

Answer : The current IP scheme needs to be subnetted.

Which of the following is a malicious program used to capture information from an infected computer? 


Options are :

  • Botnet
  • Virus
  • Worm
  • Trojan (Correct)

Answer : Trojan

Which of the following logical access control methods would a security administrator need to modify in order to control network traffic passing through a router to a different network?   


Options are :

  • Configuring VLAN 1
  • ACL (Correct)
  • Role-based access control changes
  • Logical tokens

Answer : ACL

CompTIA Network+ (N10-007) : 6 Practice Exams - 2019 Set 6

Which of the following characteristics distinguishes a virus from a rootkit, spyware, and adware? 


Options are :

  • Popup displays
  • Eavesdropping
  • Process hiding
  • Self-replication (Correct)

Answer : Self-replication

When reviewing IDS logs, the security administrator notices many events pertaining to a "NOOP sled". Which of the following attacks is occurring?   


Options are :

  • SQL injection
  • Session hijacking
  • Man-in-the-middle
  • Buffer overflow (Correct)

Answer : Buffer overflow

Which of the following BEST describes how the private key is handled when connecting to a secure web server? 


Options are :

  • Only users from configured IP addresses received the key
  • All authenticated users receive the key
  • The key is not shared and remains on the server (Correct)
  • Anyone who connects receives the key

Answer : The key is not shared and remains on the server

CompTIA A+ Certification 220-901: Practice Tests | Questions and Answers

Mitigating security risks by updating and applying hot fixes is part of: 


Options are :

  • baseline reporting.
  • patch management. (Correct)
  • vulnerability scanning.
  • penetration testing.

Answer : patch management.

Which of the following access control technologies provides a rolling password for one-time use? 


Options are :

  • PIV card
  • RSA tokens (Correct)
  • ACL
  • Multifactor authentication

Answer : RSA tokens

Which of the following is used to generate keys in PKI? 


Options are :

  • RSA (Correct)
  • DES
  • 3DES
  • AES

Answer : RSA

CompTIA JK0-801 A+ Laptops Printers and Operational Exam Set 6

An administrator believes a user is secretly transferring company information over the Internet. The network logs do not show any non-standard traffic going through the firewall. Which of the following tools would allow the administrator to better evaluate the contents of the network traffic? 


Options are :

  • Vulnerability scanner
  • Network anomaly detection
  • Protocol analyzer (Correct)
  • Proxy server

Answer : Protocol analyzer

After installing database software the administrator must manually change the default administrative password, remove a default database, and adjust permissions on specific files. These actions are BEST described as:   


Options are :

  • application hardening.
  • vulnerability assessment.
  • mandatory access control. (Correct)
  • least privilege

Answer : mandatory access control.

When establishing a connection between two IP based routers, which of the following protocols is the MOST secure? 


Options are :

  • FTP
  • TFTP
  • HTTPS
  • SSH (Correct)

Answer : SSH

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 12

A technician reviews the system log entries for an internal DNS server. Which of the following entries MOST warrants further investigation?   


Options are :

  • DNS query from a source outside the organization
  • Zone transfer to a source outside the organization (Correct)
  • Zone transfer to a source inside the organization
  • DNS query from a source inside the organization

Answer : Zone transfer to a source outside the organization

Which of the following methods is a best practice for granting access to resources? 


Options are :

  • Add ACLs to users; add users to groups.
  • Add ACLs to computers; add computers to groups.
  • Add groups to ACLs; add users and computers to groups (Correct)
  • Add users to ACLs; add computers to groups.

Answer : Add groups to ACLs; add users and computers to groups

A security analyst has been notified that one of the web servers has stopped responding to web traffic. The network engineer also reports very high bandwidth utilization to and from the Internet. Which of the following logs is MOST likely to be helpful in finding the cause and source of the problem? 


Options are :

  • Event log
  • System log
  • Access log
  • Firewall log (Correct)

Answer : Firewall log

N10-006 CompTIA Network+ Certification Practice Test Set 5

When used to encrypt transmissions, which of the following is the MOST resistant to brute force attacks?   


Options are :

  • MD5
  • SHA
  • AES256 (Correct)
  • 3DES

Answer : AES256

A user visits their normal banking website. The URL is correct and the website is displayed in the browser, but the user gets an SSL warning that the SSL certificate is invalid as it is signed by an unknown authority. Which of the following has occurred? 


Options are :

  • Replay attack
  • Privilege escalation
  • Man-in-the-middle attack (Correct)
  • Domain name kiting

Answer : Man-in-the-middle attack

Monitoring a computer's logs and critical files is part of the functionality of a 


Options are :

  • honeypot.
  • NIPS
  • HIDS (Correct)
  • firewall.

Answer : HIDS

JK0-802 CompTIA A+ Certification Exam Set 8

A technician visits a customer site which prohibits portable data storage devices. Which of the following items would be prohibited? (Select TWO).   A. USB Memory key B. Bluetooth-enabled cellular phones C. Wireless network detectors D. Key card E. Items containing RFID chips   


Options are :

  • A,C
  • C,D
  • D,E
  • A,B (Correct)

Answer : A,B

Which of the following is often bundled with freely downloaded software? 


Options are :

  • Cookies
  • Logic bomb
  • Adware (Correct)
  • Spam

Answer : Adware

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions