CompTIA Bridge Exam – Security+

 

QUESTION 61

Which system is setup to distract potential attackers?

 

A.

DMZ

B.

VLAN

C.

Honeypot

D.

Firewall

 

Correct Answer: C

 

 

QUESTION 62

Most current encryption schemes are based on:

 

A.

digital rights management

B.

time stamps

C.

randomizing

D.

algorithms

 

Correct Answer: D

 

 

QUESTION 63

Look at the following scenarios, which one would a penetration test BEST be used for?

 

A.

When providing a proof of concept demonstration for a vulnerability

B.

When conducting performance monitoring

C.

While in the reconnaissance phase

D.

When performing network mapping

 

Correct Answer: A

 

 

QUESTION 64

For the following items, which is a security limitation of virtualization technology?

 

A.

A compromise of one instance will immediately compromise all instances.

B.

It increases false positives on the NIDS.

C.

Patch management becomes more time consuming.

D.

If an attack occurs, it could potentially disrupt multiple servers.

 

Correct Answer: D

 

 

QUESTION 65

The IPSec Security Association is managed by

 

A.

ESP

B.

ISAKMP

C.

IEEE

D.

AH

 

Correct Answer: B

QUESTION 66

Why implement virtualization technology? (Select TWO).

 

A.

To reduce recovery time in the event of application failure

B.

To eliminate virtual redundancy

C.

To decrease access to security resources

D.

To provide a secure virtual environment for testing

 

Correct Answer: AD

 

 

QUESTION 67

Which description is correct about a virtual server implementation attack?

 

A.

system registry will affect all virtual instances.

B.

OS kernel will affect all virtual instances.

C.

disk partition will affect all virtual instances.

D.

RAM will affect all virtual instances.

 

Correct Answer: D

 

 

QUESTION 68

For the following items, which is a protocol analyzer?

 

A.

Cain Abel

B.

WireShark

C.

Nessus

D.

John the Ripper

 

Correct Answer: B

 

 

QUESTION 69

Message authentication codes are used to provide which service?

 

A.

Integrity

B.

Faultrecover

C.

Key recovery

D.

Acknowledgement

 

Correct Answer: A

 

 

QUESTION 70

What are the best practices while installing and securing a new system for a home user? (Select THREE).

 

A.

Use a strong firewall.

B.

Install remote control software.

C.

Apply all system patches.

D.

Apply all service packs.

 

Correct Answer: ACD

 

Free VCE & PDF File for CompTIA BR0-001 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …