Patience folks, I'm still building this one. Should have it finished this afternoon.
CompTIA Security+ (SY0-201) Practice Exam #2
There will be four tests total (as the method of producing these tests seems to die after about 170 questions are loaded). Goal is four separate test with randomly selected questions so each attempt has a different set of 50 questions per See moreattempt.
There will be roughly 700 questions between all four practice exams. . .
Disclaimer: I have been told from those that have gone to take the actual test that these questions are dissimilar. However, the basic disciplines are covered and should help considerably to pick out key associations between questions and answers
Deny the users request and forward to the human resources department.
Reboot the system.
Verify that the users permissions are correct.
Grant access to the file.
Rate this question:
Antivirus
Pop-up blocker
Anti-spyware
Personal software firewall
Rate this question:
Weak encryption
8021x
SSID broadcast
Data emanation
Rate this question:
Trojan
Worm
Botnet
Logic bomb
Rate this question:
NAT
NIDS
Netflow
Protocol analyzer
Rate this question:
Firewall
Man-in-the-middle
Proxy server
Honeypot
Rate this question:
Weak passwords
Expired passwords
Locked passwords
Backdoor passwords
Rate this question:
Viruses
Worms
Botnets
Trojans
Rate this question:
Computers must be configured for automated patch management.
Computer media must be sanitized
Default passwords must be changed once.
Computers must be tested against known TCP/IP vulnerabilities
Rate this question:
Logic bomb
Rootkit
Botnet
Privilege escalation
Rate this question:
Unshielded twisted pair cable
Coaxial cable
Fiber optic cable
Shielded twisted pair cable
Rate this question:
Fault tolerance
Key recovery
Data recovery
Integrity.
Rate this question:
A security template
A service pack
A patch
A hotfix
Rate this question:
If the physical server crashes, all of the local virtual servers go offline immediately
If the physical server crashes, all of the physical servers nearby go offline immediately
If a virtual server crashes, all of the virtual servers go offline immediately
If a virtual server crashes, all of the physical servers go offline immediately
Rate this question:
Least privilege
Implicit deny
Separation of duties
Job rotation
Rate this question:
Install a repeater
Uninterruptible power supply (UPS)
Faraday cage
Disable SSID broadcast
Rate this question:
False negative
False positive
True negative
True positive
Rate this question:
Single sign-on
Two-factor authentication
One-factor authentication
NTLMv2
Rate this question:
DoS
DDoS
MAC
ARP
Rate this question:
Piggybacking
Social engineering
Dumpster diving
Shoulder surfing
Rate this question:
L2TP
SSH
SSL
HTTP
Rate this question:
Install a network operating system on new equipment
Create a virtual server on existing equipment
Install a network operating system on existing equipment
Create a virtual server on new equipment
Rate this question:
A vulnerability scanner
Security baselines
A port scanner
Group policy
Rate this question:
Compare the final MD5 hash with the original
Download the patch file over an AES encrypted VPN connection
Compare the final LANMAN hash with the original
Download the patch file through a SSL connection
Rate this question:
Mantrap
Security badges
Hardware locks
Token access
Rate this question:
TCP/IP hijacking
DNS poisoning
Kiting
DoS
Rate this question:
Log on only as the administrator
Install only needed software
Check the logs regularly
Report all security incidents
Rate this question:
A S/MIME buffer overflow
A POP3 protocol exception
DNS poisoning
A SMTP open relay
Rate this question:
At time of hire
At time of first correspondence
At time of departure
At time of first system login
Rate this question:
Near a fiber optic cable entrance.
Near a shared LCD screen.
Near a power line.
Near a high end server
Rate this question:
Steganography
Integrity
Trusted Platform Module
Non-repudiation
Rate this question:
Disaster planning
Change management
Acceptable use policies
User education and awareness training
Rate this question:
Netops.
Lanman.
Netstat.
Ipconfig /all.
Rate this question:
An incorrect VLAN
SSID broadcasting
A repeater
A vampire tap
Rate this question:
A certificate authority
IETF
A key escrow service
A recovery agent
Rate this question:
Accept the risk
Mitigate the risk
Reject the risk
Run a new risk assessment
Rate this question:
Updating the firewall configuration to include the patches
Running a NIDS report to list the remaining vulnerabilities
Auditing for the successful application of the patches
Backing up the patch file executable to a network share
Rate this question:
Protocol analyzer
Penetration testing tool
Network mapper
Vulnerability scanner
Rate this question:
Backup all data at a preset interval to tape and store those tapes at a sister site across the street.
Backup all data at a preset interval to tape and store those tapes at a sister site in another city
Backup all data at a preset interval to removable disk and store the disk in a safety deposit box at the administrators home.
Backup all data at a preset interval to removable disk and store the disk in a fireproof safe in the buildings basement
Rate this question:
The firewall logs
The DNS logs
The access logs
The performance logs
Rate this question:
The remote PC has a spam slave application running and the local PCs have a spam master application running.
The remote PC has a zombie master application running and the local PCs have a zombie slave application running.
The remote PC has a spam master application running and the local PCs have a spam slave application running.
The remote PC has a zombie slave application running and the local PCs have a zombie master application running.
Rate this question:
That the software based firewall application trusts this site
That the pop-up blocker application trusts this site
That the anti-virus application trusts this site
That the anti-spam application trusts this site
Rate this question:
A hash produces a variable output for any input size, a cipher does not.
A cipher produces the same size output for any input size, a hash does not.
A cipher can be reversed, a hash cannot.
A hash can be reversed, a cipher cannot.
Rate this question:
Signature based HIDS
Pop-up blocker applications
Anti virus applications
Rootkit detection applications
Rate this question:
Before initial configuration
Before loading the OS
After a user logs in
After initial configuration
Rate this question:
Penetration testing
Protocol analyzers
Port scanners
Vulnerability testing
Rate this question:
Remote access user connecting via SSL VPN
Office laptop connected to the enterprise LAN
Remote access user connecting via corporate dial-in server
Office laptop connected to a home users network
Rate this question:
Get a patch management report.
Conduct a penetration test.
Run a vulnerability assessment tool.
Install a protocol analyzer
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.