JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 8

Which of the following is specific to a buffer overflow attack? 


Options are :

  • Memory addressing (Correct)
  • Session cookies
  • Directory traversal
  • Initial vector

Answer : Memory addressing

A company is testing their backup procedures and realizes that certain critical systems are unable to be restored properly with the latest tapes. Which of the following is the MOST likely cause?   


Options are :

  • EMI is affecting backups (Correct)
  • The backups are differential
  • The backups are incremental
  • Backup contingency plan is out-of-date

Answer : EMI is affecting backups

A system administrator sees a firewall rule that applies to 10.4.4.58/27. Which of the following IP address ranges are encompassed by this rule? 


Options are :

  • 10.4.4.2710.4.4.58
  • 10.4.4.5810.4.4.89
  • 10.4.4.5810.4.4.127
  • 10.4.4.3210.4.4.63 (Correct)

Answer : 10.4.4.3210.4.4.63

A security administrator wants to implement a more secure way to login to a VPN in addition to a username and password. Which of the following is the MOST secure way to log in to a VPN?   


Options are :

  • Implementing a single sign on process
  • Implementing an ACL
  • Setting up two VPNs
  • Setting up a PKI (Correct)

Answer : Setting up a PKI

Which of the following audit types would a security administrator perform on the network to ensure each workstation is standardized? 


Options are :

  • User access and rights
  • Domain wide password policy
  • Group policy (Correct)
  • Storage and retention policy

Answer : Group policy

Which of the following is capable of providing the HIGHEST encryption bit strength? 


Options are :

  • DES
  • WPA
  • AES (Correct)
  • 3DES

Answer : AES

In which of the following locations can password complexity be enforced via group policy? 


Options are :

  • Local SAM databases
  • Domain controllers (Correct)
  • ACLs
  • NAC servers

Answer : Domain controllers

Which of the following will help prevent unauthorized access to a smartphone? 


Options are :

  • Voice encryption (Correct)
  • Screen lock
  • GPS tracking
  • Remote wipe

Answer : Voice encryption

Which of the following is the BEST choice for encryption on a wireless network? 


Options are :

  • WPA2-PSK (Correct)
  • WPA
  • AES
  • WEP

Answer : WPA2-PSK

The success of a user security education and awareness plan is largely dependent on support from:   


Options are :

  • senior management. (Correct)
  • human resources.
  • project management.
  • contractors.

Answer : senior management.

Which of the following BEST describes the function of TPM? 


Options are :

  • A trusted OS model
  • High speed secure removable storage device
  • Third party certificate trust authority
  • Hardware chip that stores encryption keys (Correct)

Answer : Hardware chip that stores encryption keys

Which of the following describes the direction a signal will emanate from if a Yagi antenna is placed parallel to the floor? 


Options are :

  • Directly from the point of the antenna, parallel to the floor
  • In a downward direction, perpendicular to the floor
  • Up and down, perpendicular to the floor
  • Side to side, parallel with the floor (Correct)

Answer : Side to side, parallel with the floor

Which of the following access control methods requires significant background investigations? 


Options are :

  • Mandatory Access Control (MAC)
  • Role-based Access Control (RBAC) (Correct)
  • Rule-based Access Control (RBAC)
  • Discretionary Access Control (DAC)

Answer : Role-based Access Control (RBAC)

Which of the following assessments is directed towards exploiting successive vulnerabilities to bypass security controls? 


Options are :

  • Vulnerability scanning
  • Physical lock testing
  • Penetration testing (Correct)
  • Port scanning

Answer : Penetration testing

Which of the following is an example of a smart card? 


Options are :

  • One-time password
  • PIV
  • MAC (Correct)
  • Tokens

Answer : MAC

Which of the following is an example of requiring users to have a password that consists of alphanumeric and two special characters? 


Options are :

  • Password expiration requirements
  • Password recovery requirements
  • Password complexity requirements (Correct)
  • Password length requirements

Answer : Password complexity requirements

Employees are allowed access to webmail while on the company network. The employees use this ability to upload attachments and send email from their corporate accounts to their webmail. Which of the following would BEST mitigate this risk? 


Options are :

  • Acceptable Use Policy
  • Clean Desk Policy
  • Fuzzing
  • Data Leak Prevention (Correct)

Answer : Data Leak Prevention

Which of the following allows a security administrator to divide a network into multiple zones? (Select TWO]

A. PAT

B. EIGRP

C. VLAN

D. NAT

E. Subnetting 


Options are :

  • C,D
  • A,D
  • A,B
  • C,E (Correct)

Answer : C,E

Which of the following elements of PKI are found in a browser's trusted root CA? 


Options are :

  • Public key (Correct)
  • Recovery key
  • Private key
  • Symmetric key

Answer : Public key

A new product is being evaluated by the security team. Which of the following would take financial and business impacts into consideration if this product was likely to be purchased for large scale use? 


Options are :

  • Technical threat
  • Strength of security controls
  • Risk assessment (Correct)
  • Application vulnerability

Answer : Risk assessment

Which of the following should be performed if a smartphone is lost to ensure no data can be retrieved from it? 


Options are :

  • GPS tracking
  • Remote wipe (Correct)
  • Screen lock
  • Device encryption

Answer : Remote wipe

A user receives an unsolicited email to change their online banking password. After clicking on the link contained in the email the user enters their banking credentials and changes their password. Days later, when checking their account balance they notice multiple money transfers to other accounts. Which of the following BEST describes the type of attack? 


Options are :

  • Replay
  • Phishing (Correct)
  • Malicious insider
  • Smurf attack

Answer : Phishing

When WPA is implemented using PSK, which of the following authentication types is used? 


Options are :

  • SHA
  • LEAP
  • MD5
  • TKIP (Correct)

Answer : TKIP

Several classified mobile devices have been stolen. Which of the following would BEST reduce the data leakage threat? 


Options are :

  • Use stronger encryption algorithms.
  • Use GPS tracking to find the devices
  • Remotely sanitize the devices. (Correct)
  • Immediately inform local law enforcement.

Answer : Remotely sanitize the devices.

A CRL is comprised of:   


Options are :

  • untrusted private keys. (Correct)
  • trusted CA's.
  • public keys.
  • malicious IP addresses

Answer : untrusted private keys.

Which of the following logical controls does a flood guard protect against? 


Options are :

  • Botnet attack
  • SYN attacks (Correct)
  • Xmas attacks
  • Spanning tree

Answer : SYN attacks

A hard drive of a terminated employee has been encrypted with full disk encryption, and a technician is not able to decrypt the data. Which of the following ensures that, in the future, a technician will be able to decrypt this information? 


Options are :

  • Public key
  • Passphrase
  • Certificate authority
  • Key escrow (Correct)

Answer : Key escrow

Which of the following is a trusted OS implementation used to prevent malicious or suspicious code from executing on Linux and UNIX platforms?   


Options are :

  • System File Checker (SFC)
  • Tripwire
  • vmlinuz
  • SELinux (Correct)

Answer : SELinux

Which of the following devices would be installed on a single computer to prevent intrusion?   


Options are :

  • VPN concentrator
  • Network firewall
  • Host-based firewall (Correct)
  • Host intrusion detection

Answer : Host-based firewall

Which of the following is a way to control system access by department function? 


Options are :

  • Mandatory Access Control
  • Role-Based Access Control (Correct)
  • Rule-Based Access Control
  • Discretionary Access Control

Answer : Role-Based Access Control

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions