CompTIA Academic/E2C Security+ Certification Exam Voucher Only v10.0 (JK0-022)

Page:    1 / 67   
Total 993 questions

At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to stop unauthorized access?

  • A. Configure an access list.
  • B. Configure spanning tree protocol.
  • C. Configure port security.
  • D. Configure loop protection.

Answer : C

Port security in IT can mean several things. It can mean the physical control of all connection points, such as RJ-45 wall jacks or device ports, so that no unauthorized users or unauthorized devices can attempt to connect into an open port. This can be accomplished by locking down the wiring closet and server vaults and then disconnecting the workstation run from the patch panel (or punch-down block) that leads to a rooms wall jack. Any unneeded or unused wall jacks can (and should) be physically disabled in this manner. Another option is to use a smart patch panel that can monitor the MAC address of any device connected to each and every wall port across a building and detect not just when a new device is connected to an empty port, but also when a valid device is disconnected or replaced by an invalid device.

An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to integrate the security controls of some of the network devices in the organization. Which of the following methods would BEST accomplish this goal?

  • A. Unified Threat Management
  • B. Virtual Private Network
  • C. Single sign on
  • D. Role-based management

Answer : A

Unified Threat Management (UTM) is, basically, the combination of a firewall with other abilities. These abilities include intrusion prevention, antivirus, content filtering, etc.
Advantages of combining everything into one:
You only have one product to learn.
You only have to deal with a single vendor.
IT provides reduced complexity.

A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to unauthorized file transfers, and wants to configure a firewall to block all
TFTP traffic.
Which of the following would accomplish this task?

  • A. Deny TCP port 68
  • B. Deny TCP port 69
  • C. Deny UDP port 68
  • D. Deny UDP port 69

Answer : D

Trivial File Transfer Protocol (TFTP) is a simple file-exchange protocol that doesnt require authentication. It operates on UDP port 69.

Ann, a sales manager, successfully connected her company-issued smartphone to the wireless network in her office without supplying a username/password combination. Upon disconnecting from the wireless network, she attempted to connect her personal tablet computer to the same wireless network and could not connect.
Which of the following is MOST likely the reason?

  • A. The company wireless is using a MAC filter.
  • B. The company wireless has SSID broadcast disabled.
  • C. The company wireless is using WEP.
  • D. The company wireless is using WPA2.

Answer : A

MAC filtering allows you to include or exclude computers and devices based on their MAC address.

A system administrator attempts to ping a hostname and the response is
Which of the following replies has the administrator received?

  • A. The loopback address
  • B. The local MAC address
  • C. IPv4 address
  • D. IPv6 address

Answer : D

IPv6 addresses are 128-bits in length. An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). The hexadecimal digits are case-insensitive, but IETF recommendations suggest the use of lower case letters. The full representation of eight 4- digit groups may be simplified by several techniques, eliminating parts of the representation.

A network administrator wants to block both DNS requests and zone transfers coming from outside IP addresses. The company uses a firewall which implements an implicit allow and is currently configured with the following ACL applied to its external interface.


Which of the following rules would accomplish this task? (Select TWO).

  • A. Change the firewall default settings so that it implements an implicit deny
  • B. Apply the current ACL to all interfaces of the firewall
  • C. Remove the current ACL
  • D. Add the following ACL at the top of the current ACL DENY TCP ANY ANY 53
  • E. Add the following ACL at the bottom of the current ACL DENY ICMP ANY ANY 53
  • F. Add the following ACL at the bottom of the current ACL DENY IP ANY ANY 53

Answer : A,F

Implicit deny is the default security stance that says if you arent specifically granted access or privileges for a resource, youre denied access by default. Implicit deny is the default response when an explicit allow or deny isnt present.
DNS operates over TCP and UDP port 53. TCP port 53 is used for zone transfers. These are zone file exchanges between DNS servers, special manual queries, or used when a response exceeds 512 bytes. UDP port 53 is used for most typical DNS queries.

A network technician is on the phone with the system administration team. Power to the server room was lost and servers need to be restarted. The DNS services must be the first to be restarted. Several machines are powered off. Assuming each server only provides one service, which of the following should be powered on FIRST to establish DNS services?

  • A. Bind server
  • B. Apache server
  • C. Exchange server
  • D. RADIUS server

Answer : A

BIND (Berkeley Internet Name Domain) is the most widely used Domain Name System
(DNS) software on the Internet. It includes the DNS server component contracted for name daemon. This is the only option that directly involves DNS.

Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to connect to that AP and gain unauthorized access. Which of the following would be the
BEST way to mitigate this issue and still provide coverage where needed? (Select TWO).

  • A. Disable the wired ports
  • B. Use channels 1, 4 and 7 only
  • C. Enable MAC filtering
  • D. Disable SSID broadcast
  • E. Switch from 802.11a to 802.11b

Answer : C,D

Explanation: Network administrators may choose to disable SSID broadcast to hide their network from unauthorized personnel. However, the SSID is still needed to direct packets to and from the base station, so its a discoverable value using a wireless packet sniffer.
Thus, the SSID should be disabled if the network isnt for public use.
A MAC filter is a list of authorized wireless client interface MAC addresses that is used by a
WAP to block access to all unauthorized devices.

A firewall technician has been instructed to disable all non-secure ports on a corporate firewall. The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and allowed?

  • A. Blocked: TFTP, HTTP, NetBIOS; Allowed: HTTPS, FTP
  • B. Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS
  • C. Blocked: SFTP, TFTP, HTTP, NetBIOS; Allowed: SSH, SCP, HTTPS
  • D. Blocked: FTP, HTTP, HTTPS; Allowed: SFTP, SSH, SCP, NetBIOS

Answer : B

The question states that traffic on port 21, 69, 80, and 137-139 is blocked, while ports 22 and 443 are allowed.
Port 21 is used for FTP by default.
Port 69 is used for TFTP.
Port 80 is used for HTTP.
Ports 137-139 are used for NetBIOS.
VMM uses SFTP over default port 22.
Port 22 is used for SSH by default.
SCP runs over TCP port 22 by default.
Port 443 is used for HTTPS.

An access point has been configured for AES encryption but a client is unable to connect to it. Which of the following should be configured on the client to fix this issue?

  • A. WEP
  • B. CCMP
  • C. TKIP
  • D. RC4

Answer : B

CCMP is an encryption protocol designed for Wireless LAN products that implement the standards of the IEEE 802.11i amendment to the original IEEE 802.11 standard. CCMP is an enhanced data cryptographic encapsulation mechanism designed for data confidentiality and based upon the Counter Mode with CBC-MAC (CCM) of the AES standard.

After reviewing the firewall logs of her organizations wireless APs, Ann discovers an unusually high amount of failed authentication attempts in a particular segment of the building. She remembers that a new business moved into the office space across the street. Which of the following would be the BEST option to begin addressing the issue?

  • A. Reduce the power level of the AP on the network segment
  • B. Implement MAC filtering on the AP of the affected segment
  • C. Perform a site survey to see what has changed on the segment
  • D. Change the WPA2 encryption key of the AP in the affected segment

Answer : A

Some access points include power level controls that allow you to reduce the amount of output provided if the signal is traveling too far.

Review the following diagram depicting communication between PC1 and PC2 on each side of a router. Analyze the network traffic logs which show communication between the two computers as captured by the computer with IP


PC1 PC2 -
[]--------[INSIDE router OUTSIDE]---------[]

10:30:22, SRC, DST, SYN
10:30:23, SRC, DST, SYN/ACK
10:30:24, SRC, DST, ACK
Given the above information, which of the following can be inferred about the above environment?

  • A. is a web server.
  • B. The web server listens on a non-standard port.
  • C. The router filters port 80 traffic.
  • D. The router implements NAT.

Answer : D

Network address translation (NAT) allows you to share a connection to the public Internet via a single interface with a single public IP address. NAT maps the private addresses to the public address. In a typical configuration, a local network uses one of the designated
"private" IP address subnets. A router on that network has a private address ( in that address space, and is also connected to the Internet with a "public" address
( assigned by an Internet service provider.

A company has proprietary mission critical devices connected to their network which are configured remotely by both employees and approved customers. The administrator wants to monitor device security without changing their baseline configuration. Which of the following should be implemented to secure the devices without risking availability?

  • A. Host-based firewall
  • B. IDS
  • C. IPS
  • D. Honeypot

Answer : B

An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of flavors and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use
IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies.
IDPSes have become a necessary addition to the security infrastructure of nearly every organization.
IDPSes typically record information related to observed events, notify security administrators of important observed events and produce reports. Many IDPSes can also respond to a detected threat by attempting to prevent it from succeeding. They use several response techniques, which involve the IDPS stopping the attack itself, changing the security environment (e.g. reconfiguring a firewall) or changing the attack's content.

The security administrator needs to manage traffic on a layer 3 device to support FTP from a new remote site. Which of the following would need to be implemented?

  • A. Implicit deny
  • B. VLAN management
  • C. Port security
  • D. Access control lists

Answer : D

In the OSI model, IP addressing and IP routing are performed at layer 3 (the network layer). In this question we need to configure routing. When configuring routing, you specify which IP range (in this case, the IP subnet of the remote site) is allowed to route traffic through the router to the FTP server.
Traffic that comes into the router is compared to ACL entries based on the order that the entries occur in the router. New statements are added to the end of the list. The router continues to look until it has a match. If no matches are found when the router reaches the end of the list, the traffic is denied. For this reason, you should have the frequently hit entries at the top of the list. There is an implied deny for traffic that is not permitted.

A companys legacy server requires administration using Telnet. Which of the following protocols could be used to secure communication by offering encryption at a lower OSI layer? (Select TWO).

  • A. IPv6
  • B. SFTP
  • C. IPSec
  • D. SSH
  • E. IPv4

Answer : A,C

Telnet supports IPv6 connections.
IPv6 is the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPsec is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec is a compulsory component for IPv6.
IPsec operates at Layer 3 of the OSI model, whereas Telnet operates at Layer 7.

Page:    1 / 67   
Total 993 questions