CompTIA Security+ (Sy0-201)

184 Questions | Attempts: 487
Please wait...
Question 1 / 185
🏆 Rank #--
Score 0/100

1. Which of the following might an attacker resort to in order to recover discarded company
documents?

Submit
Please wait...
About This Quiz
Security Plus Quizzes & Trivia

CompTIA Security+ (SY0-201) Practice Exam
Keep coming back as more questions are added daily. Goal is a test with over 700 randomly selected questions so each attempt has a different set of 50 questions per attempt.
177 of 730 loaded..//22Sept2010
Disclaimer: I have been told from those that have gone to... see moretake the actual test that these questions are dissimilar. However, the basic disciplines are covered and should help considerably to pick out key associations between questions and answers. see less

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Which of the following attacks can be caused by a user being unaware of their physical
surroundings?

Submit

3. Which of the following is commonly used in a distributed denial of service (DDOS) attack?

Submit

4. Which of the following type of strategies can be applied to allow a user to enter their user name and password once in order to authenticate to multiple systems and applications?

Submit

5. Which of the following is an attack that is triggered by a specific event or by a date?

Submit

6. Which of the following is a true statement with regards to a NIDS?

Submit

7. After registering an email address on a website, a user starts receiving messages from unknown sources. The email account is new, and therefore the user is concerned. This type of message traffic is referred to as:

Submit

8. Which of the following is the primary purpose of a honeypot?

Submit

9. While conducting a review of the system logs, a user had attempted to log onto the network over 250 times. Which of the following type of attacks is MOST likely occurring?

Submit

10. The RAS logs on a server show 100 errors in a two minute time period from an attempt to access an account. The error log shows unknown username or password. Which of the following is this an example of?

Explanation

This is an example of a brute-force attack. An automated bot or possible bot-net is attempting random user-name and password combination multiple times per second - a rate much too high for a human to initiate. (Domain 2.5)

Submit

11. Which of the following is a publication of inactivated user certificates?

Submit

12. Password crackers are generally used by malicious attackers to:

Submit

13. Which of the following is a collection of patches?

Submit

14. End users are complaining about receiving a lot of email from online vendors and  pharmacies.Which of the following is this an example of?

Submit

15. Which of the following access control methods grants permissions based on the users position in the company?

Submit

16. Which of the following is a method of encrypting email?

Submit

17. If a user attempts to go to a website and notices the URL has changed, which of the following
attacks is MOST likely the cause?

Submit

18. Which of the following methods is used to perform denial of service (DoS) attacks?

Submit

19. A technician is reviewing the logical access control method an organization uses. One of the
senior managers requests that the technician prevent staff members from logging on during nonworking days. Which of the following should the technician implement to meet managements request?

Submit

20. A technician suspects that a piece of malware is consuming too many CPU cycles and slowing down a system. Which of the following will help determine the amount of CPU cycles that are being consumed?

Submit

21. A user has decided that they do not want an internal LAN segment to use public IP addresses. The user wants to translate them as private IP addresses to a pool of public IP addresses to identify them on the Internet. Which of the following does the user want to  implement?

Submit

22. An administrator wants to ensure that that no equipment is damaged when there is a fire or false alarm in the server room. Which of the following type of fire suppression systems should be used?

Submit

23. Which of the following is a best practice to prevent users from being vulnerable to social
engineering?

Explanation

You should have a high level of confidence that the correct preventative procedures are in place, and the best way to obtain that confidence is to periodically check them against your users. This can be impromptu or via structured training courses. (Domain 6.6)

Submit

24. How should a company test the integrity of its backup data?

Submit

25. Which of the following logical access controls would be MOST appropriate to use when creating an account for a temporary worker?

Submit

26. Which of the following is the MOST secure alternative for administrative access to a router?

Submit

27. An administrator is implementing a public website and they want all client connections to the
server to be encrypted via their web browser. Which of the following should be implemented?

Submit

28. Which of the following is the main objective of steganography?

Submit

29. Which of the following access control methods includes switching work assignments at preset
intervals?

Submit

30. Which of the following threats is the MOST difficult to detect and hides itself from the operating
system?

Submit

31. When is the BEST time to update anti-virus definitions?

Submit

32. A technician is testing the security of a new database application with a website front-end. The technician notices that when certain characters are input into the application it will crash the server. Which of the following does the technician need to do?

Submit

33. Which of the following type of fire suppression tools would cause the MOST damage to electrical equipment?

Submit

34. Which of the following allows devices attached to the same switch to have separate broadcast
domains?

Explanation

VLAN (Virtual Local Area Network) allows you to create groups of users and systems and segment them on the network. This segmentation lets you hide segments of the network from other segments and thereby control access.
Think of a VLAN as a network of hosts that act as if they're connected by a physical wire even though there is no such wire between them. (Domain 2.2)

Submit

35. Which of the following allows for proof that a certain person sent a particular email?

Submit

36. Which of the following risks would be reduced by implementing screen filters?

Submit

37. A malware incident has just been detected within a company. Which of the following should be the administrators FIRST response?

Submit

38. A user is redirected to a different website when the user requests the DNS record
www.xyz.comptia.com. Which of the following is this an example of?

Submit

39. Which of the following is a CRL composed of?

Submit

40. An administrator wants to replace telnet with a more secure protocol to manage a network device. Which of the following should be implemented on the network?

Submit

41. Which of the following is a software bundle containing multiple security fixes?

Submit

42. Which of the following is the BEST place where the disaster recovery plan should be kept?

Explanation

Although all of the local storage sites are acceptable locations, it is important to avoid keeping all you eggs in one basket, which is the primary reason for offsite recovery facilities whether in the form of a cold, warm, or hot standby configuration. The DRP should be accessible at all locations that house the equipment necessary for recovery. (Domain 6.2)

Submit

43. How many keys are utilized with asymmetric cryptography?

Submit

44. Which of the following is a single server that is setup in the DMZ or outer perimeter in order to distract attackers?

Submit

45. Which of the following ensures a user cannot deny having sent a message?

Submit

46. An administrator has developed an OS install that will implement the tightest security controls
possible. In order to quickly replicate these controls on all systems, which of the following should be established?

Submit

47. Which of the following is an installable package that includes several patches from the same
vendor for various applications?

Submit

48. Which of the following provides the MOST comprehensive redundancy for an entire site with the least downtime?

Explanation

An alternative site can be a hot site, a warm site, or a cold site.
Hot Site - a location that can provide operations within hours of a failure. All equipment and software is pre-configured to be instantly available to the network. Databases are synced in real time and operational data is backed up on a regular basis, ensuring the least amount of down-time and data dissimilarities. Hot sites can also double as off-site storage facilities, providing immediate access to archives and backup media. Very expensive to implement and maintain because all hardware and software costs are typically doubled.

Submit

49. Which of the following allows a technician to scan for missing patches on a device without actually attempting to exploit the security problem?

Explanation

A vulnerability scanner is a tool used to scan a target system for known holes, weaknesses, or vulnerabilities. These automated tools have a database of attacks, probes, and scripts that are run against systems in a controlled manner. (Domain 4.2)

Submit

50. An administrator has implemented a new SMTP service on a server. A public IP address translates to the internal SMTP server. The administrator notices many sessions to the server, and gets notification that the servers public IP address is now reported in a spam real-time block list.Which of the following is wrong with the server?

Submit

51. A programmer has decided to alter the server variable in the coding of an authentication function for a proprietary sales application. Before implementing the new routine on the production application server, which of the following processes should be followed?

Submit

52. Which of the following describes the process of securely removing information from media (e. g. hard drive) for future use?

Submit

53. Which of the following specifies a set of consistent requirements for a workstation or server?

Submit

54. Users do not want to enter credentials to each server or application to conduct their normal work. Which of the following type of strategies will resolve this issue?

Explanation

SSO (Single Sign-On)- Passes previously established two-factor authentication credentials on to all applications and systems that the user requires access to in a given authenticated session (Domain 3.6)

Submit

55. Which of the following allows for notification when a hacking attempt is discovered?

Explanation

NIDS (Network-based Intrusion Detection System) - a system attached to the network that monitors and captures events to determine if an intrusion is occurring. (Domain 2.3)

Submit

56. Which of the following is a reason why a company should disable the SSID broadcast of the wireless access points?

Submit

57. During a risk assessment it is discovered that only one system administrator is assigned several tasks  critical to continuity of operations. It is recommended to cross train other system administrators to perform these tasks and mitigate which of the following risks?

Submit

58. An administrator is trying to secure a network from threats originating outside the network. Which of the following devices provides protection for the DMZ from attacks launched from the Internet?

Submit

59. Which of the following should be implemented to have all workstations and servers isolated in their own broadcast domains?

Submit

60. An administrator wants to setup their network with only one public IP address. Which of the
following would allow for this?

Submit

61. Why would a technician use a password cracker?

Submit

62. Which of the following is the primary purpose of a CA?

Submit

63. How should a company test the integrity of its backup data?

Submit

64. Which of the following will propagate itself without any user interaction?

Submit

65. Which of the following principles should be applied when assigning permissions?

Submit

66. Which of the following is a security threat when a new network device is configured for first-time installation?

Submit

67. Which of the following allows for the highest level of security at time of login?

Submit

68. Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?

Submit

69. Which of the following would be BEST to use to apply corporate security settings to a device?

Submit

70. Which of the following practices is MOST relevant to protecting against operating system security flaws?

Submit

71. Which of the following would be MOST useful to determine why packets from a computer outside the network are being dropped on the way to a computer inside the network?

Submit

72. After issuance a technician becomes aware that some keys were issued to individuals who are not authorized to use them. Which of the following should the technician use to correct this problem?

Submit

73. Which of the following is the BEST tool for allowing users to go to approved business-related
websites only?

Submit

74. Accessing a system or application using permissions from another users account is a form of
which of the following?

Submit

75. Which of the following network tools would provide the information on what an attacker is doing to compromise a system?

Submit

76. An administrator suspects that files are being copied to a remote location during off hours. The file server does not have logging enableD. Which of the following logs would be the BEST place to look for information?

Submit

77. Which of the following access control methods gives the owner control over providing
permissions?

Submit

78. Which of the following allows an attacker to hide the presence of malicious code by altering the systems process and registry entries?

Submit

79. Which of the following should a technician review when a user is moved from one department to another?

Submit

80. A company's website allows customers to search for a product and display the current price and quantity available of each product from the production database. Which of the following would invalidate an SQL injection attack launched from the look-up field at the web server level?

Submit

81. A company wants to host public servers on a new network. These servers will include a website and mail server.Which of the following should be implemented on the network to isolate these public hosts from the rest of the network?

Submit

82. Which of the following can reduce the risk associated with password guessing attacks? (Select TWO).

Submit

83. Antivirus software products detect malware by comparing the characteristics of known instances against which of the following type of file sets?

Submit

84. When deploying 50 new workstations on the network, which of following should be completed FIRST?

Submit

85. Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?

Submit

86. An unauthorized user intercepted a users password and used this information to obtain the
company's administrator password. The unauthorized user can use the administrators password to access sensitive information pertaining to client data. Which of the following is this an example of?

Submit

87. An administrator notices that former temporary employees accounts are still active on a domain. Which of the following can be implemented to increase security and prevent this from happening?

Explanation

Every account should be configured to expire. As the account continues to be used, the expiration should be deferred, but any account not being used should be allowed to expire. (Domain 3.5)

Submit

88. When dealing with a 10BASE5 network, which of the following is the MOST likely security risk?

Explanation

10Base5 is a Coaxial medium based network. A vampire tap is a vulnerability of the coax medium that uses a type of connection device that hooks directly into the coax wire by piercing the outer sheath and attaching a small wire to the center conductor or core. Its naming comes from the device resembling vampire fangs. (Domain 2.6)

Submit

89. Which of following can BEST be used to determine the topology of a network and discover unknown devices?

Submit

90. When should a technician perform penetration testing?

Submit

91. Which of the following improves security in a wireless system?

Submit

92. Which of the following allows a technician to correct a specific issue with a solution that has not been fully tested?

Submit

93. Which of the following can be used as a means for dual-factor authentication?

Submit

94. Sending a patch through a testing and approval process is an example of which of the following?

Submit

95. Which of the following would an attacker use to footprint a system?

Submit

96. A technician wants to regulate and deny traffic to websites that contain information on hacking.Which of the following would be the BEST solution to deploy?

Submit

97. Which of the following BEST describes the term war driving?

Submit

98. Which of the following tools would be used to review network traffic for clear text passwords?

Submit

99. Sending continuous TCP requests to a device and ignoring the return information until the device ceases to accept new connections is an example of which of the following?

Submit

100. An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?

Submit

101. If a certificate has been compromised, which of the following should be done?

Submit

102. Which of the following is the BEST way to reduce the number of accounts a user must maintain?

Submit

103. A technician is implementing a new wireless network for an organization. The technician should be concerned with all of the following wireless vulnerabilities EXCEPT:

Submit

104. Which of the following creates a security buffer zone between two rooms?

Submit

105. Which of the following is a list of discrete entries that are known to be benign?

Submit

106. Which of the following allows an attacker to embed a rootkit into a picture?

Submit

107. Which of the following is a way to logically separate a network through a switch?

Submit

108. Which of the following is a reason to implement security logging on a DNS server?

Submit

109. Which of the following is considered the weakest encryption?

Submit

110. Which of the following statements BEST describes the implicit deny concept?

Submit

111. All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:

Submit

112. Which of the following BEST describes a private key in regards to asymmetric encryption?

Submit

113. Which of the following is the LEAST intrusive way of checking the environment for known software flaws?

Submit

114. During the implementation of LDAP, which of the following will typically be changed within the
organizations software programs?

Submit

115. How would a technician implement a security patch in an enterprise environment?

Submit

116. Users on a network report that they are receiving unsolicited emails from an email address that
does not change. Which of the following steps should be taken to stop this from occurring?

Submit

117. Which of the following is a common practice in forensic investigation?

Explanation

A binary copy ensures that every bit of data is copied from the drive, while a file level copy might not capture hidden or system files. You do not want to sanitize a drive under forensic investigation because this would delete all trace of data when your objective is to retrieve and analyze data.
(Domain 6.3)

Submit

118. Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?

Submit

119. Which of the following may be an indication of a possible system compromise?

Submit

120. Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives.Which of the following mitigation techniques would address this concern? (Select TWO).

Submit

121. Which of the following is done to ensure appropriate personnel have access to systems and
networks? (Select TWO).

Submit

122. A user was trying to update an open file but when they tried to access the file they were denied. Which of the following would explain why the user could not access the file?

Submit

123. Which of the following is a best practice for coding applications in a secure manner?

Submit

124. Which of the following is established immediately upon evidence seizure?

Explanation

Chain of Custody - the log of the history of evidence that has been collected.
An important concept to keep in mind when working with incidents is the chain of custody. When you begin to collect evidence, you must keep track of that evidence at all times and show who has it, who has seen it, and where it has been. The evidence must always be within your custody, or you're open to dispute about whether it has been tampered with. (Domain 6.3)

Submit

125. On which of the following is a security technician MOST likely to find usernames?

Submit

126. After implementing file auditing, which of the following logs would show unauthorized usage
attempts?

Submit

127. Which of the following type of attacks requires an attacker to sniff the network?

Submit

128. Which of the following actions should be performed upon discovering an unauthorized wireless
access point attached to a network?

Submit

129. An administrator in a small office environment has implemented an IDS on the network perimeter to detect malicious traffic patterns. The administrator still has a concern about traffic inside the network originating between client workstations. Which of the following could be implemented?

Submit

130. A company uses a policy of assigning passwords to users, by default the passwords are based off of the word $ervicexx, where xx is the last two numbers of the users cell phone number. The users are not required to change this password. Which of the following is this an example of?

Explanation

Although the password seems to meet complexity requirements, it is based off a dictionary word. It is also unwise to assign all new user accounts a similar password or not require the user to change the password on initial log on.

Submit

131. Which of the following authentication methods would MOST likely prevent an attacker from being able to successfully deploy a replay attack?

Submit

132. Which of the following algorithms is the LEAST secure?

Submit

133. Which of the following properly describes penetration testing?

Submit

134. A technician is rebuilding the infrastructure for an organization. The technician has been tasked with making sure that the virtualization technology is implemented securely. Which of the following is a concern when implementing virtualization technology?

Submit

135. Which of the following tools will allow the technician to find all open ports on the network?

Submit

136. Which of the following encryption schemes is the public key infrastructure based on?

Submit

137. An administrator has been studying stateful packet inspection and wants to implement this security technique on the network. Which of the following devices could the administrator use to BEST utilize stateful packet inspection?

Submit

138. Which of the following is an important reason for password protecting the BIOS?

Submit

139. Which of the following network filtering devices will rely on signature updates to be effective?

Submit

140. Which of the following is an exploit against a device where only the hardware model and
manufacturer are known?

Submit

141. Which of the following is the BEST process of removing PII data from a disk drive before reuse?

Explanation

PII (Personally Identifiable Information) - any data that can be used to trace back to the person and should be protected internally. Reformatting a drive does not prevent retrieval through forensic methods. Using a degauss-er or destroying the drive will render it inoperable, which is not what the question asks.

Submit

142. Which of the following algorithms is MOST closely associated with the signing of email messages?

Submit

143. User A is a member of the payroll security group. Each member of the group should have
read/write permissions to a share. User A was trying to update a file but when the user tried to
access the file the user was denied. Which of the following would explain why User A could not access the file?

Submit

144. Which of the following is a security trait of a virtual machine?

Submit

145. A user is attempting to receive digitally signed and encrypted email messages from a remote
office. Which of the following protocols does the system need to support?

Submit

146. Which of the following is MOST likely provided by asymmetric key cryptography?

Explanation

One of the major reasons to implement a cryptographic system is to ensure the confidentiality of the information being used. (Domain 5.1)

Submit

147. Which of the following is an example of security personnel that administer access control
functions, but do not administer audit functions?

Submit

148. A smurf attack is an example of which of the following threats?

Submit

149. Which of the following is the MOST recent addition to cryptography?

Explanation

AES (Advanced Encryption Standard) has replaced DES as the current standard. AES is now the current product used by the U.S. governmental agencies. AES uses key lengths of 128 (default), 192, and 256-bits. (Domain 5.3)

Submit

150. A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protecteD. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If the anti-malware software is purchased, which of the following is the expected net savings?

Submit

151. An administrator has been asked to encrypt credit card data. Which of the following algorithms would be the MOST secure with the least CPU utilization?

Submit

152. Which of the following would allow an administrator to find weak passwords on the network?

Explanation

Not all attacks are only brute-force or dictionary based. A number of hybrids also exist that will try combinations of these two methods. One of the more common techniques involves using rainbow tables-values of hashes-to identify the salt (random bits added to the password) used in creating the stored value.

Submit

153. Which of the following is a required privilege that an administrator must have in order to restore a public/private key set on a certificate authority (CA)?

Explanation

A RA (registration authority) offloads some of the work from a CA. An RA system operates as the middle-man in the process. It can distribute keys, accept registrations for the CA and validate identities. The RA doesn't issue certificates; that responsibility remains with the CA. (Domain 5.6)

Submit

154. Which of the following redundancy solutions contains hardware systems similar to the affected
organization, but does not provide live data?

Submit

155. A technician needs to detect staff members that are connecting to an unauthorized website. Which of the following could be used?

Submit

156. Taking into account personal safety, which of the following types of fire suppression substances would BEST prevent damage to electronic equipment?

Submit

157. Which of the following is a way to encrypt session keys using SSL?

Explanation

SSL establishes a session using asymmetric encryption and maintains the session using symmetric encryption. (Domain 5.4)

Submit

158. Which of the following would be the MOST secure choice to implement for authenticating remote connections?

Submit

159. Which of the following algorithms have the smallest key space?

Explanation

DES (Data Encryption Standard) has since been replaced by AES. It's a strong and efficient algorithm based on a 56-bit key. AES uses key lengths of 128 (default), 192, and 256-bits. (Domain 5.3)

Submit

160. Which of the following BEST describes ARP?

Submit

161. An executive uses PKI to encrypt sensitive emails sent to an assistant. In addition to encrypting the body of the email, the executive wishes to encrypt the signature so that the assistant can verify that the email actually came from the executive. Which of the following asymmetric keys should the executive use to encrypt the signature?

Submit

162. Which of the following is MOST efficient for encrypting large amounts of data?

Submit

163. An organization is installing new servers into their infrastructure. A technician is responsible for making sure that all new servers meet security requirements for up time. In which of the following is the availability requirements identified?

Submit

164. Which of the following is the primary security risk with coaxial cable?

Explanation

Coaxial cable is a shielded copper core data transmission medium. It does not have a light source nor is capable of refraction. Coaxial is not bundled with multiple wires per sheathing like LAN (Cat 5/6) cables, therefore it does not suffer from crosstalk either. The only risk is a break in the outer shielding, usually consisting of a steel braid just beneath the outer jacket. The loss of the shield can allow data to radiate outward from the core and could be intercepted with the right equipment. (Domain 2.1)

Submit

165. Which of the following uses a key ring?

Submit

166. Which of the following requires an update to the baseline after installing new software on a
machine?

Submit

167. Which of the following virtual machine components monitors and manages the various virtual
instances?

Submit

168. Kerberos uses which of the following trusted entities to issue tickets?

Submit

169. When assigning permissions, which of the following concepts should be applied to enable a
person to perform their job task?

Submit

170. Which of the following is a way to manage operating system updates?

Submit

171. Which of the following can an attacker use to gather information on a system without having a user ID or password?

Submit

172. All of the following are symmetric key algorithms EXCEPT:

Explanation

ECC (Elliptic Curve Cryptography) - A type of public key cryptosystem that requires a shorter key length than many other cryptosystems (including the de facto industry standard, RSA). (Domain 5.1)

Submit

173. A user wants to implement secure LDAP on the network. Which of the following port numbers secure LDAP use by default?

Submit

174. An administrator suspects that multiple PCs are infected with a zombie. Which of the following
tools could be used to confirm this?

Submit

175. Which of the following logs might reveal the IP address and MAC address of a rogue device within the local network?

Submit

176. Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key?

Submit

177. An administrator does not want anyone to VPN from inside the network to a remote office or
network. Which of the following protocols should be blocked outbound on the network?

Explanation

ISAKMP (Internet Security Association and Key Management Protocol) - responsible for creation and exchange of secure key algorithms across IP networks. VPN connections require this protocol to establish a secure connection.
TPM (Trusted Platform Module) - Used to store passwords on a chip.
OVAL (Open Vulnerability and Assessment Language) - A standard method of testing, analyzing and reporting vulnerabilities.
SNMP (Simple Network Management Protocol) - Sends information regarding network to network health status to network management consoles such as HP Openview.

Submit

178. Which of the following increases the collision resistance of a hash?

Submit

179. Which of the following requires a common pre-shared key before communication can begin?

Explanation

Always remember that symmetric encryption uses the same key to encrypt and decrypt data (a primary weakness being that you have to share the key with others). Asymmetric encryption uses two keys: one to encrypt and another to decrypt. (Domain 5.6)

Submit

180. Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?

Submit

181. Which of the following are characteristics of a hash function? (Select TWO).

Submit

182. Which of the following encryption algorithms is decrypted in the LEAST amount of time?

Submit

183. Which of the following is true about ECC algorithms?

Explanation

Since ECC is the least CPU intensive type of Asymmetrical Encryption Algorithms; smaller, less-intelligent devices such as cellphones and PDAs implement ECC. (Domain 5.1)

Submit

184. Assigning proper security permissions to files and folders is the primary method of mitigating which of the following?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (184)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following might an attacker resort to in order to recover...
Which of the following attacks can be caused by a user being unaware...
Which of the following is commonly used in a distributed denial of...
Which of the following type of strategies can be applied to allow a...
Which of the following is an attack that is triggered by a specific...
Which of the following is a true statement with regards to a NIDS?
After registering an email address on a website, a user starts...
Which of the following is the primary purpose of a honeypot?
While conducting a review of the system logs, a user had attempted to...
The RAS logs on a server show 100 errors in a two minute time period...
Which of the following is a publication of inactivated user...
Password crackers are generally used by malicious attackers to:
Which of the following is a collection of patches?
End users are complaining about receiving a lot of email from online...
Which of the following access control methods grants permissions based...
Which of the following is a method of encrypting email?
If a user attempts to go to a website and notices the URL has changed,...
Which of the following methods is used to perform denial of service...
A technician is reviewing the logical access control method an...
A technician suspects that a piece of malware is consuming too many...
A user has decided that they do not want an internal LAN segment to...
An administrator wants to ensure that that no equipment is damaged...
Which of the following is a best practice to prevent users from being...
How should a company test the integrity of its backup data?
Which of the following logical access controls would be MOST...
Which of the following is the MOST secure alternative for...
An administrator is implementing a public website and they want all...
Which of the following is the main objective of steganography?
Which of the following access control methods includes switching work...
Which of the following threats is the MOST difficult to detect and...
When is the BEST time to update anti-virus definitions?
A technician is testing the security of a new database application...
Which of the following type of fire suppression tools would cause the...
Which of the following allows devices attached to the same switch to...
Which of the following allows for proof that a certain person sent a...
Which of the following risks would be reduced by implementing screen...
A malware incident has just been detected within a company. Which of...
A user is redirected to a different website when the user requests the...
Which of the following is a CRL composed of?
An administrator wants to replace telnet with a more secure protocol...
Which of the following is a software bundle containing multiple...
Which of the following is the BEST place where the disaster recovery...
How many keys are utilized with asymmetric cryptography?
Which of the following is a single server that is setup in the DMZ or...
Which of the following ensures a user cannot deny having sent a...
An administrator has developed an OS install that will implement the...
Which of the following is an installable package that includes several...
Which of the following provides the MOST comprehensive redundancy for...
Which of the following allows a technician to scan for missing patches...
An administrator has implemented a new SMTP service on a server. A...
A programmer has decided to alter the server variable in the coding of...
Which of the following describes the process of securely removing...
Which of the following specifies a set of consistent requirements for...
Users do not want to enter credentials to each server or application...
Which of the following allows for notification when a hacking attempt...
Which of the following is a reason why a company should disable the...
During a risk assessment it is discovered that only one system...
An administrator is trying to secure a network from threats...
Which of the following should be implemented to have all workstations...
An administrator wants to setup their network with only one public IP...
Why would a technician use a password cracker?
Which of the following is the primary purpose of a CA?
How should a company test the integrity of its backup data?
Which of the following will propagate itself without any user...
Which of the following principles should be applied when assigning...
Which of the following is a security threat when a new network device...
Which of the following allows for the highest level of security at...
Which of the following allows an attacker to manipulate files by using...
Which of the following would be BEST to use to apply corporate...
Which of the following practices is MOST relevant to protecting...
Which of the following would be MOST useful to determine why packets...
After issuance a technician becomes aware that some keys were issued...
Which of the following is the BEST tool for allowing users to go to...
Accessing a system or application using permissions from another users...
Which of the following network tools would provide the information on...
An administrator suspects that files are being copied to a remote...
Which of the following access control methods gives the owner control...
Which of the following allows an attacker to hide the presence of...
Which of the following should a technician review when a user is moved...
A company's website allows customers to search for a product and...
A company wants to host public servers on a new network. These servers...
Which of the following can reduce the risk associated with password...
Antivirus software products detect malware by comparing the...
When deploying 50 new workstations on the network, which of following...
Which of the following technologies can be used as a means to isolate...
An unauthorized user intercepted a users password and used this...
An administrator notices that former temporary employees accounts are...
When dealing with a 10BASE5 network, which of the following is the...
Which of following can BEST be used to determine the topology of a...
When should a technician perform penetration testing?
Which of the following improves security in a wireless system?
Which of the following allows a technician to correct a specific issue...
Which of the following can be used as a means for dual-factor...
Sending a patch through a testing and approval process is an example...
Which of the following would an attacker use to footprint a system?
A technician wants to regulate and deny traffic to websites that...
Which of the following BEST describes the term war driving?
Which of the following tools would be used to review network traffic...
Sending continuous TCP requests to a device and ignoring the return...
An administrator wants to proactively collect information on attackers...
If a certificate has been compromised, which of the following should...
Which of the following is the BEST way to reduce the number of...
A technician is implementing a new wireless network for an...
Which of the following creates a security buffer zone between two...
Which of the following is a list of discrete entries that are known to...
Which of the following allows an attacker to embed a rootkit into a...
Which of the following is a way to logically separate a network...
Which of the following is a reason to implement security logging on a...
Which of the following is considered the weakest encryption?
Which of the following statements BEST describes the implicit deny...
All of the following provide confidentiality protection as part of the...
Which of the following BEST describes a private key in regards to...
Which of the following is the LEAST intrusive way of checking the...
During the implementation of LDAP, which of the following will...
How would a technician implement a security patch in an enterprise...
Users on a network report that they are receiving unsolicited emails...
Which of the following is a common practice in forensic investigation?
Which of the following type of attacks would allow an attacker to...
Which of the following may be an indication of a possible system...
Users are utilizing thumb drives to connect to USB ports on company...
Which of the following is done to ensure appropriate personnel have...
A user was trying to update an open file but when they tried to access...
Which of the following is a best practice for coding applications in a...
Which of the following is established immediately upon evidence...
On which of the following is a security technician MOST likely to find...
After implementing file auditing, which of the following logs would...
Which of the following type of attacks requires an attacker to sniff...
Which of the following actions should be performed upon discovering an...
An administrator in a small office environment has implemented an IDS...
A company uses a policy of assigning passwords to users, by default...
Which of the following authentication methods would MOST likely...
Which of the following algorithms is the LEAST secure?
Which of the following properly describes penetration testing?
A technician is rebuilding the infrastructure for an organization. The...
Which of the following tools will allow the technician to find all...
Which of the following encryption schemes is the public key...
An administrator has been studying stateful packet inspection and...
Which of the following is an important reason for password protecting...
Which of the following network filtering devices will rely on...
Which of the following is an exploit against a device where only the...
Which of the following is the BEST process of removing PII data from a...
Which of the following algorithms is MOST closely associated with the...
User A is a member of the payroll security group. Each member of the...
Which of the following is a security trait of a virtual machine?
A user is attempting to receive digitally signed and encrypted email...
Which of the following is MOST likely provided by asymmetric key...
Which of the following is an example of security personnel that...
A smurf attack is an example of which of the following threats?
Which of the following is the MOST recent addition to cryptography?
A small call center business decided to install an email system to...
An administrator has been asked to encrypt credit card data. Which of...
Which of the following would allow an administrator to find weak...
Which of the following is a required privilege that an administrator...
Which of the following redundancy solutions contains hardware systems...
A technician needs to detect staff members that are connecting to an...
Taking into account personal safety, which of the following types of...
Which of the following is a way to encrypt session keys using SSL?
Which of the following would be the MOST secure choice to implement...
Which of the following algorithms have the smallest key space?
Which of the following BEST describes ARP?
An executive uses PKI to encrypt sensitive emails sent to an...
Which of the following is MOST efficient for encrypting large amounts...
An organization is installing new servers into their infrastructure. A...
Which of the following is the primary security risk with coaxial...
Which of the following uses a key ring?
Which of the following requires an update to the baseline after...
Which of the following virtual machine components monitors and manages...
Kerberos uses which of the following trusted entities to issue...
When assigning permissions, which of the following concepts should be...
Which of the following is a way to manage operating system updates?
Which of the following can an attacker use to gather information on a...
All of the following are symmetric key algorithms EXCEPT:
A user wants to implement secure LDAP on the network. Which of the...
An administrator suspects that multiple PCs are infected with a...
Which of the following logs might reveal the IP address and MAC...
Which of the following would allow for secure key exchange over an...
An administrator does not want anyone to VPN from inside the network...
Which of the following increases the collision resistance of a hash?
Which of the following requires a common pre-shared key before...
Which of the following security policies is BEST to use when trying to...
Which of the following are characteristics of a hash function? (Select...
Which of the following encryption algorithms is decrypted in the LEAST...
Which of the following is true about ECC algorithms?
Assigning proper security permissions to files and folders is the...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!