SY0-401 CompTIA Security+ Certification Practice Exam Set 5

Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?  



Options are :

  • Web application firewall
  • Load balancer
  • Protocol analyzer (Correct)
  • Spam filter

Answer : Protocol analyzer

Joe, a technician at the local power plant, notices that several turbines had ramped up in cycles during the week. Further investigation by the system engineering team determined that a timed .exe file had been uploaded to the system control console during a visit by international contractors. Which of the following actions should Joe recommend?  
 


Options are :

  • Enable PKI for the MainFrame
  • Create a VLAN for the SCADA (Correct)
  • Implement patch management
  • Implement stronger WPA2 Wireless

Answer : Create a VLAN for the SCADA

JK0-016 CompTIA Network+ 2009 Edition Practice Exam Set 10

Which of the following components of an all-in-one security appliance would MOST likely be configured in order to restrict access to peer-to-peer file sharing websites?  
 


Options are :

  • Spam filter
  • Content inspection
  • URL filter (Correct)
  • Malware inspection

Answer : URL filter

Sara, a security technician, has received notice that a vendor coming in for a presentation will require access to a server outside of the network. Currently, users are only able to access remote sites through a VPN connection. How could Sara BEST accommodate the vendor?  


Options are :

  • Turn off the firewall while the vendor is in the office, allowing access to the remote site.
  • Set up a VPN account for the vendor, allowing access to the remote site.
  • write a firewall rule to allow the vendor to have access to the remote site. (Correct)
  • Allow incoming IPSec traffic into the vendor’s IP address.

Answer : write a firewall rule to allow the vendor to have access to the remote site.

The Human Resources department has a parent shared folder setup on the server. There are two groups that have access, one called managers and one called staff. There are many sub folders under the parent shared folder, one is called payroll. The parent folder access control list propagates all subfolders and all subfolders inherit the parent permission.   Which of the following is the quickest way to prevent the staff group from gaining access to the payroll folder?  


Options are :

  • Remove the staff group from the payroll folder
  • Remove inheritance from the payroll folder
  • Implicit deny on the payroll folder for the managers group
  • Implicit deny on the payroll folder for the staff group (Correct)

Answer : Implicit deny on the payroll folder for the staff group

JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 8

When performing the daily review of the system vulnerability scans of the network Joe, the administrator, noticed several security related vulnerabilities with an assigned vulnerability identification number. Joe researches the assigned vulnerability identification number from the vendor website. Joe proceeds with applying the recommended solution for identified vulnerability.  Which of the following is the type of vulnerability described?  

 


Options are :

  • Host based
  • Network based
  • Signature based (Correct)
  • IDS

Answer : Signature based

The security administrator needs to manage traffic on a layer 3 device to support FTP from a new remote site. Which of the following would need to be implemented?  
 


Options are :

  • Port security
  • Implicit deny
  • VLAN management
  • Access control lists (Correct)

Answer : Access control lists

A company has several conference rooms with wired network jacks that are used by both employees and guests. Employees need access to internal resources and guests only need access to the Internet. Which of the following combinations is BEST to meet the requirements?  


Options are :

  • NAT and DMZ
  • Switches and a firewall
  • VPN and IPSec
  • 802.1x and VLANs (Correct)

Answer : 802.1x and VLANs

SY0-401 CompTIA Security+ Certification Practice Exam Set 5

On Monday, all company employees report being unable to connect to the corporate wireless network, which uses 802.1x with PEAP. A technician verifies that no configuration changes were made to the wireless network and its supporting infrastructure, and that there are no outages. Which of the following is the MOST likely cause for this issue?  


Options are :

  • The DNS server is overwhelmed with connections and is unable to respond to queries.
  • The Remote Authentication Dial-In User Service server certificate has expired. (Correct)
  • Too many incorrect authentication attempts have caused users to be temporarily disabled.
  • The company IDS detected a wireless attack and disabled the wireless network.

Answer : The Remote Authentication Dial-In User Service server certificate has expired.

The administrator receives a call from an employee named Joe. Joe says the Internet is down and he is receiving a blank page when typing to connect to a popular sports website. The administrator asks Joe to try visiting a popular search engine site, which Joe reports as successful. Joe then says that he can get to the sports site on this phone. Which of the following might the administrator need to configure?  
 


Options are :

  • The sensitivity level of the spam filter
  • The pop up blocker in the employee’s browser
  • The default block page on the URL filter (Correct)
  • The access rules on the IDS

Answer : The default block page on the URL filter

A review of the company’s network traffic shows that most of the malware infections are caused by users visiting gambling and gaming websites. The security manager wants to implement a solution that will block these websites, scan all web traffic for signs of malware, and block the malware before it enters the company network. Which of the following is suited for this purpose?  



Options are :

  • UTM (Correct)
  • ACL
  • Firewall
  • IDS

Answer : UTM

CompTIA Network+ 6 Certification Practice Exams - 2019 Set 11

Pete, a security administrator, has observed repeated attempts to break into the network.Which of the following is designed to stop an intrusion on the network?  


Options are :

  • NIPS (Correct)
  • HIPS
  • NIDS
  • HIDS

Answer : NIPS

Which of the following should be deployed to prevent the transmission of malicious traffic between virtual machines hosted on a singular physical device on a network?  


Options are :

  • HIDS on each virtual machine
  • HIPS on each virtual machine (Correct)
  • NIPS on the network
  • NIDS on the network

Answer : HIPS on each virtual machine

Which of the following devices would be MOST useful to ensure availability when there are a large number of requests to a certain website?  


Options are :

  • Protocol analyzer
  • VPN concentrator
  • Web security gateway
  • Load balancer (Correct)

Answer : Load balancer

N10-006 CompTIA Network+ Certification Practice Test Set 6

The network security engineer just deployed an IDS on the network, but the Chief Technical Officer (CTO) has concerns that the device is only able to detect known anomalies. Which of the following types of IDS has been deployed?  
 


Options are :

  • Heuristic IDS
  • Behavior Based IDS
  • Anomaly Based IDS
  • Signature Based IDS (Correct)

Answer : Signature Based IDS

An administrator would like to review the effectiveness of existing security in the enterprise. Which of the following would be the BEST place to start?  


Options are :

  • Rewrite the existing security policy
  • Implement an intrusion prevention system (Correct)
  • Review past security incidents and their resolution
  • Install honey pot systems

Answer : Implement an intrusion prevention system

Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network. Which of the following types of technologies will BEST address this scenario?  
  


Options are :

  • Proxy Firewall
  • Signature IDS
  • Application Firewall
  • Anomaly Based IDS (Correct)

Answer : Anomaly Based IDS

JK0-802 CompTIA A+ Certification Exam Set 9

Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?  


Options are :

  • Router
  • Sniffer
  • Firewall (Correct)
  • Switch

Answer : Firewall

A company has proprietary mission critical devices connected to their network which are configured remotely by both employees and approved customers. The administrator wants to monitor device security without changing their baseline configuration. Which of the following should be implemented to secure the devices without risking availability?  


Options are :

  • IDS (Correct)
  • IPS
  • Honeypot
  • Host-based firewall

Answer : IDS

The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data should be segregated from the main corporate network to prevent unauthorized access and that access to the IT systems should be logged. Which of the following would BEST meet the CISO’s requirements?  


Options are :

  • NIDS
  • Web proxies
  • Firewalls (Correct)
  • Sniffers
  • Layer 2 switches

Answer : Firewalls

JK0-802 CompTIA A+ Certification Exam Set 12

A database administrator contacts a security administrator to request firewall changes for a connection to a new internal application. The security administrator notices that the new application uses a port typically monopolized by a virus. The security administrator denies the request and suggests a new port or service be used to complete the application’s task.  Which of the following is the security administrator practicing in this example?



Options are :

  • Port security
  • Access control lists (Correct)
  • Implicit deny
  • Explicit deny

Answer : Access control lists

Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task?  



Options are :

  • NIPS (Correct)
  • HIDS
  • Spam filter
  • Firewall

Answer : NIPS

A technician is deploying virtual machines for multiple customers on a single physical host to reduce power consumption in a data center. Which of the following should be recommended to isolate the VMs from one another?  


Options are :

  • Develop a patch management guide
  • Virtual switches with VLANs (Correct)
  • Implement a virtual firewall
  • Install HIPS on each VM

Answer : Virtual switches with VLANs

CV0-001 CompTIA Cloud+ Certification Practice Exam Set 8

A network administrator wants to block both DNS requests and zone transfers coming from outside IP addresses. The company uses a firewall which implements an implicit allow and is currently configured with the following ACL applied to its external interface.  
PERMIT TCP ANY ANY 80 
PERMIT TCP ANY ANY 443  
Which of the following rules would accomplish this task? (Choose two.) A. Change the firewall default settings so that it implements an implicit deny 
B. Apply the current ACL to all interfaces of the firewall 
C. Remove the current ACL 
D. Add the following ACL at the top of the current ACLDENY TCP ANY ANY 53 
E. Add the following ACL at the bottom of the current ACLDENY ICMP ANY ANY 53 
F. Add the following ACL at the bottom of the current ACLDENY IP ANY ANY 53


Options are :

  • B,D
  • A,F (Correct)
  • A,E
  • C,D
  • A,F

Answer : A,F

Matt, the network engineer, has been tasked with separating network traffic between virtual machines on a single hypervisor.   
Which of the following would he implement to BEST address this requirement? (Choose two.)  
A. Virtual switch 
B. NAT 
C. System partitioning 
D. Access-list 
E. Disable spanning tree 
F. VLAN


Options are :

  • D,F
  • A,F (Correct)
  • B,C
  • D,E
  • A,E

Answer : A,F

A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks. Which of the following is MOST likely the reason for the sub-interfaces?



Options are :

  • The sub-interfaces each implement quality of service
  • The network uses the subnet of 255.255.255.128.
  • The sub-interfaces are configured for VoIP traffic.
  • The switch has several VLANs configured on it. (Correct)

Answer : The switch has several VLANs configured on it.

JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 13

 Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?  
 


Options are :

  • NIDS
  • Routers
  • WAF (Correct)
  • Switches

Answer : WAF

At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to stop unauthorized access?  


Options are :

  • Configure an access list.
  • Configure spanning tree protocol.
  • Configure port security. (Correct)
  • Configure loop protection.

Answer : Configure port security.

Which of the following network design elements allows for many internal devices to share one public IP address?  
 


Options are :

  • DMZ
  • PAT (Correct)
  • DNAT
  • DNS

Answer : PAT

Practice : CompTIA Network+ (N10-007)

Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?  


Options are :

  • Packet Filter Firewall
  • Stateful Firewall (Correct)
  • Proxy Firewall
  • Application Firewall

Answer : Stateful Firewall

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions