(FreeCourseWeb - Com) B08HHSY83JEBOK
(FreeCourseWeb - Com) B08HHSY83JEBOK
by Examsdigest®
2
CompTIA Security+ SY0-601 Practice Tests 2020®
Published by: Examsdigest LLC., Holzmarktstraße 73, Berlin, Germany,
www.examsdigest.com Copyright © 2020 by Examsdigest LLC.
3
CONTENTS AT A GLANCE
4
INTRODUCTION
The CompTIA Security+ SY0-601 examination is a global certi-
fication that validates the baseline skills you need to perform
core security functions and pursue an IT security career.
This book has been designed to help you prepare for the style
of questions you will receive on the CompTIA Security+
SY0-601 exams. It also helps you understand the topics you
can expect to be tested on for each exam.
The online practice that comes free with this book offers you
the same questions and answers that are available here and
more.
So if you need help with the domain Network Security, then se-
lect questions related to this topic online and start practicing.
The online practice that comes free with this book offers you
the same questions and answers that are available here and
more.
8
Exam Content
Content Outline
The CompTIA Security+ certification exam will verify the suc-
cessful candidate has the knowledge and skills required to:
• Assess the security posture of an enterprise environment and
recommend and implement appropriate security solutions
• Monitor and secure hybrid environments, including cloud,
mobile, and IoT
• Operate with an awareness of applicable laws and policies,
including principles of governance, risk, and compliance
• Identify, analyze, and respond to security events and inci-
dents
9
CHAPTER 1
ARCHITECTURE AND DESIGN
Questions 1-35
10
Question 3. Authentication, ______________, and Accounting is
the term for intelligently controlling access to computer re-
sources, enforcing policies, auditing usage, and providing the
information necessary to bill for services.
(A) Controlling
(B) Authorization
(C) Auditing
(D) Enforcing
12
Question 8. Which of the following companies is not a cloud
service provider?
(A) Amazon Web Services
(B) Microsoft Azure
(C) Examsdigest
(D) Google Cloud Platform
Question 24. You are working for a startup and recently the
application you are developing experienced a large amount of
traffic. As a result, the performance of the application was de-
creased. You have been instructed to implement a solution to
efficiently distributing incoming network traffic across a group
of backend servers to increase the performance of the APP.
18
Which of the following solutions will you implement to meet the
requirement?
(A) Load balancers
(B) Network interface card teaming
(C) Multipath
(D) Redundant array of inexpensive disks
20
Question 30. Which of the following technique will you use to
hide secret data within a non-secret file or message with the
purpose of avoiding data detection?
(A) Elliptical curve cryptography
(B) Homomorphic encryption
(C) Lightweight cryptography
(D) Steganography
21
Question 33. Which of the following part(s) of the Authentica-
tion, Authorization, and Accounting (AAA) is responsible for
measuring the resources a user consumes during access to a
system?
(A) Accounting
(B) Authorization
(C) Authentication
(D) Authentication & Authorization
23
Answers 1-35
24
then a number ordered by increasing level of difficulty.
26
The goal of continuous monitoring is to increase the visibility
and transparency of network activity, especially suspicious
network activity that could indicate a security breach, and to
mitigate the risk of cyber attacks with a timely alert system that
triggers a rapid incident response.
29
DNS Sinkholing is incorrect. DNS sinkhole or black hole DNS
is used to spoof DNS servers to prevent resolving host names
of specified URLs. This can be achieved by configuring the
DNS forwarder to return a false IP address to a specific URL.
30
Explanation 5. Serverless is the correct answer. Serverless
architecture is a way to build and run applications and services
without having to manage infrastructure. Your application still
runs on servers, but all the server management is done by
AWS. You no longer have to provision, scale, and maintain
servers to run your applications, databases, and storage sys-
tems.
For instance, you can use the public cloud for high-volume,
lower-security needs such as web-based email, and the private
cloud (or other on-premises infrastructure) for sensitive, busi-
ness-critical operations like financial reporting.
37
XaaS is incorrect. Anything as a service (XaaS) describes a
general category of services related to cloud computing and
remote access. It recognizes the vast number of products,
tools, and technologies that are now delivered to users as a
service over the internet.
The rest answers are incorrect because they are cloud ser-
vice providers.
38
Question 9. You are developing a new system that requires
users to be authenticated using temporary passcode which is
generated by an algorithm that uses the current time of day.
Which of the following authentication methods will you use to
authenticate the users?
(A) HOTP
(B) SMS
(C) Push notifications
(D) TOTP
39
HOTP is incorrect. Event-based OTP (also called HOTP mean-
ing HMAC-based One-Time Password) is the original One-Time
Password algorithm and relies on two pieces of information.
The first is the secret key, called the “seed”, which is known
only by the token and the server that validates submitted OTP
codes.
41
Elasticity is incorrect. Elasticity is the ability of an IT in-
frastructure to quickly expand or cut back capacity and ser-
vices without hindering or jeopardizing the infrastructure's sta-
bility, performance, or security.
Many applications that you use every day rely on APIs in some
capacity to function, since there are APIs for almost every cate-
gory imaginable.
46
Fog computing is a decentralized computing infrastructure in
which data, compute, storage and applications are located be-
tween the data source and the cloud. Like edge computing, fog
computing brings the advantages and power of the cloud clos-
er to where data is created and acted upon.
47
Cloud computing is incorrect. Cloud computing is the deliv-
ery of different services through the Internet. These resources
include tools and applications like data storage, servers, data-
bases, networking, and software.
The hot site must be equipped with all the necessary hardware,
software, network, and Internet connectivity. Data is regularly
backed up or replicated to the hot site so that it can be made
fully operational in a minimal amount of time in the event of a
disaster at the original site.
57
Explanation 19. TRUE is the correct answer.
A managed service provider (MSP) is a company that remotely
manages a customer’s IT infrastructure and/or end-user sys-
tems, typically on a proactive basis and under a subscription
model.
The hot site must be equipped with all the necessary hardware,
software, network, and Internet connectivity. Data is regularly
backed up or replicated to the hot site so that it can be made
fully operational in a minimal amount of time in the event of a
disaster at the original site.
With SaaS, you don’t need to install and run software ap-
plications on your computer (or any computer). Everything is
available over the internet when you log in to your account on-
line.
63
SaaS platforms are:
1. Available over the internet.
2. Hosted on a remote server by a third-party provider.
3. Scalable, with different tiers for small, medium, and enter-
prise-level businesses.
4. Inclusive, offering security, compliance, and maintenance as
part of the cost.
Question 24. You are working for a startup and recently the
application you are developing experienced a large amount of
traffic. As a result, the performance of the application was de-
creased. You have been instructed to implement a solution to
efficiently distributing incoming network traffic across a group
of backend servers to increase the performance of the APP.
Which of the following solutions will you implement to meet the
requirement?
64
(A) Load balancers
(B) Network interface card teaming
(C) Multipath
(D) Redundant array of inexpensive disks
65
The connected network adapters, shown as one or more virtual
adapters. These virtual network adapters provide fast perfor-
mance and fault tolerance in the event of a network adapter
failure.
Notable types are the hard disk drive (HDD) containing a non-
removable disk, the floppy disk drive (FDD) and its removable
68
floppy disk, and various optical disc drives (ODD) and associat-
ed optical disc media.
Many applications that you use every day rely on APIs in some
capacity to function, since there are APIs for almost every cate-
gory imaginable.
72
Question 28. Cloud backup is a strategy for sending a copy of
files or database to a secondary server which is usually hosted
by a third-party service provider, for preservation in case of
equipment failure or catastrophe. (True/False)
(A) TRUE
(B) FALSE
The private key is not shared, and the overall process is more
secure as compared to symmetric encryption.
74
Question 30. Which of the following technique will you use to
hide secret data within a non-secret file or message with the
purpose of avoiding data detection?
(A) Elliptical curve cryptography
(B) Homomorphic encryption
(C) Lightweight cryptography
(D) Steganography
75
It is very difficult for a resource-limited environment to imple-
ment the standard cryptographic algorithms due to the imple-
mentation size, speed, or throughput and energy consumption.
The lightweight cryptography trade-offs implementation cost,
speed, security, performance, and energy consumption on re-
source-limited devices. The motivation of lightweight cryptog-
raphy is to use less memory, less computing resource, and less
power supply to provide security solutions that can work over
resource-limited devices.
78
Tokenization is incorrect. Tokenization is the process of turn-
ing a meaningful piece of data, such as an account number,
into a random string of characters called a token that has no
meaningful value if breached. Tokens serve as a reference to
the original data, but cannot be used to guess those values.
That’s because, unlike encryption, tokenization does not use a
mathematical process to transform sensitive information into
the token.
79
Question 32. Which of the following backup types only back
up the data that has changed since the previous backup?
(A) Full backup
(B) Incremental backup
(C) Differential backup
(D) Snapshot backup
80
Snapshot backup is incorrect. A snapshot backup is a type of
backup copy used to create the entire architectural instance/
copy of an application, disk or system. It is used in backup pro-
cesses to restore the system or disk of a particular device at a
specific time. A snapshot backup can also be referred to as im-
age backup.
82
Explanation 34. A, B, D, and E are the correct answers.
The actions that should be taken to increase the security of
SCADA networks are:
1. Identify all connections to SCADA networks
2. Disconnect unnecessary connections to the SCADA network
3. Implement internal and external intrusion detection systems
4. Conduct physical security surveys and assess all remote
sites connected to the SCADA network
5. Disable unnecessary services
84
CHAPTER 2
ATTACKS, THREATS,
AND VULNERABILITIES
Questions 36-71
86
Question 40. There are two main techniques for driver manip-
ulating: Shimming and Refactoring. Shiming is the process of
changing a computer program’s internal structure without mod-
ifying its external functional behavior or existing functionality.
(A) TRUE
(B) FALSE
87
Question 43. Which of the following attack occurs when
someone infiltrates a system through an outside partner or
provider with access to the systems and data?
(A) Supply-chain attack
(B) Skimming
(C) Remote Access Trojan
(D) Command and control
89
Question 49. What type of attack is when an attacker takes
over a regular user account on a network and attempts to gain
administrative permissions?
(A) Cross-site scripting
(B) Directory traversal
(C) Privilege escalation
(D) Buffer overflow
91
Question 54. Which of the following attacks isn’t intended to
steal data but to remain in place for as long as possible, quietly
mining in the background?
(A) Logic bomb
(B) Keylogger
(C) Rootkit
(D) Crypto-malware
92
Question 57. A hacker introduced corrupt Domain Name Sys-
tem (DNS) data into a DNS resolver’s cache with the aim of
redirecting users either to the wrong websites or to his own
computer. What type of DNS attack, hacker implement in this
scenario?
(A) DNS Poisoning
(B) URL redirection
(C) Domain Hijacking
(D) DNS Corruption
Question 58. The document that lists out the specifics of your
penetration testing project to ensure that both the client and
the engineers working on a project know exactly what is being
tested when it’s being tested, and how it’s being tested is
known as:
(A) Lateral Movements
(B) Rules of Engagement
(C) Pivoting
(D) Bug Bounty
96
Question 68. Which of the following terms refers to Informa-
tion Technology (IT) applications and infrastructure that are
managed and utilized without the knowledge of the enterprise’s
IT department?
(A) Script Kiddies
(B) Indicators of compromise
(C) Shadow IT
(D) Open-source intelligence
98
Answers 36-71
103
A Trojan acts as a bona fide application or file to trick you. It
seeks to deceive you into loading and executing the malware
on your device. Once installed, a Trojan can perform the action
it was designed for.
Question 40. There are two main techniques for driver manip-
ulating: Shimming and Refactoring. Shiming is the process of
changing a computer program’s internal structure without mod-
ifying its external functional behavior or existing functionality.
(True/False)
(A) TRUE
(B) FALSE
112
Explanation 44. Watering hole attack is the correct answer.
Watering hole attack is a method in which the attacker seeks
to compromise a specific group of end-users by infecting web-
sites that members of that group are known to visit.
Hackers often create fake websites that imitate the look and
feel of your intended destination so you may not realize you’re
at a different site. Sometimes these sites exist to sell products
and services that are in direct competition with those sold at
118
the website you had intended to visit, but most often they are
intended to steal your personal identifiable information, includ-
ing credit cards or passwords.
The actual attack occurs when the victim visits the web page
or web application that executes the malicious code. The web
page or web application becomes a vehicle to deliver the mali-
cious script to the user’s browser.
121
In some cases, an attacker might be able to write to arbitrary
files on the server, allowing them to modify application data or
behavior, and ultimately take full control of the server.
124
Phishing is incorrect. An attacker, masquerading as a trusted
entity, dupes a victim into opening an email, instant message,
or text message.
The switch’s MAC address table becomes full and now it’s not
able to save more MAC address, which means it enters into a
fail-open mode and starts behaving like a network Hub. Frames
are flooded to all ports, similar to a broadcast type of communi-
cation.
The attacker’s machine will be delivered with all the frames be-
tween the victim and other machines. The attacker will be able
to capture sensitive data from the network. Given the above
scenario, identify the Layer 2 type of attack.
125
(A) ARP poisoning
(B) MAC flooding
(C) MAC cloning
(D) Man-in-the-browser
For example, some ISPs register your computer card MAC ad-
dress when the service is first installed. When you place a
router behind the cable modem or DSL modem, the MAC ad-
dress from the device WAN port is not recognized by the ISP.
127
Man-in-the-browser is incorrect. A man-in-the-browser at-
tack uses a Trojan horse (typically spread through email) to in-
stall malware as an extension or Browser Helper Object (BHO).
The malware initiates a man-in-the-browser attack by inter-
cepting all communication between a user’s browser and a
destination Web server, changing the messages or transactions
as they occur in real-time.
130
The Keylogger is incorrect as the keylogger is a malicious
program for recording computer user keystrokes to steal pass-
words and other sensitive information.
133
Examples may include changing an account password or mak-
ing a transaction via an online banking portal.
Question 58. The document that lists out the specifics of your
penetration testing project to ensure that both the client and
the engineers working on a project know exactly what is being
tested when it’s being tested, and how it’s being tested is
known as:
(A) Lateral Movements
(B) Rules of Engagement
(C) Pivoting
(D) Bug Bounty
135
Explanation 58. Rules of Engagement is the correct an-
swer.
The Rules of Engagement, or ROE, are meant to list out the
specifics of your penetration testing project to ensure that both
the client and the engineers working on a project know exactly
what is being tested when it’s being tested, and how it’s being
tested.
140
Explanation 62. Footprinting is the correct answer.
Footprinting is a part of the reconnaissance process which is
used for gathering possible information about a target comput-
er system or network. Footprinting could be both passive and
active.
142
Question 63. Which of the following options is a dictionary
that provides definitions for publicly disclosed cybersecurity
vulnerabilities and exposures?
(A) Log aggregation
(B) Common Vulnerabilities and Exposures
(C) Sentiment analysis
(D) Security Orchestration, Automation, and Response
143
Sentiment analysis is incorrect. Sentiment analysis helps
data analysts within large enterprises gauge public opinion,
conduct nuanced market research, monitor brand and product
reputation, and understand customer experiences.
The White Team also reads the security reports and scores
them for accuracy and countermeasures.
153
Question 70. The technique of redirecting victims from a cur-
rent page to a new URL which is usually a phishing page that
impersonates a legitimate site and steals credentials from the
victims is known as:
(A) URL redirection
(B) DNS spoofing
(C) Domain hijacking
(D) Domain redirection
154
Domain hijacking is incorrect. Domain hijacking is the act of
changing the registration of a domain name without the per-
mission of the original owner, or by abuse of privileges on do-
main hosting and domain registrar systems.
155
Black-Hat Hackers is incorrect. Black-Hat hackers violate
computer security for personal gain without permission (such
as stealing credit card numbers or harvesting personal data for
sale to identity thieves) or for pure maliciousness (such as cre-
ating a botnet and using that botnet to perform DDoS attacks
against websites they don’t like).
156
CHAPTER 3
IMPLEMENTATION
Questions 72-106
157
Question 74. As a security expert of your company you are re-
sponsible for preventing unauthorized (rogue) Dynamic Host
Configuration Protocols servers offering IP addresses to the
clients. Which of the following security technology will you im-
plement to meet the requirement?
(A) DHCP snooping
(B) BPDU guard
(C) MAC filtering
(D) Jump server
158
Question 76. One of the features of SNMPv3 is called mes-
sage integrity.
(A) TRUE
(B) FALSE
159
Question 79. In which of the following load balancer mode,
two or more servers aggregate the network traffic load and
work as a team distributes it to the network servers?
(A) Active/active
(B) Active/passive
(C) Passive/active
(D) Passive/passive
163
Question 89. You have been tasked to implement a solution to
encrypt data as it is written to the disk and decrypt data as it is
read off the disk. Which of the following solution will you im-
plement to meet the requirement?
(A) Root of trust
(B) Trusted Platform Module
(C) Self-encrypting drive (SED) / full-disk encryption (FDE)
(D) Sandboxing
165
Question 95. Assuming you have the domain yourcompany.
com with the following sub-domains:
www.yourcompany.com
mail.yourcompany.com
intranet.yourcompany.com
secure.yourcompany.com
me.yourcompany.com
170
Answer 72-106
171
Geolocation is incorrect. Geolocation refers to the use of lo-
cation technologies such as GPS or IP addresses to identify
and track the whereabouts of connected electronic devices.
172
Question 73. You have been tasked to access a remote com-
puter for handling some administrative tasks over an unsecured
network in a secure way. Which of the following protocols will
you use to access the remote computer to handle the adminis-
trative tasks?
(A) SRTP
(B) LDAPS
(C) SSH
(D) HTTPS
174
Question 74. As a security expert of your company you are re-
sponsible for preventing unauthorized (rogue) Dynamic Host
Configuration Protocols servers offering IP addresses to the
clients. Which of the following security technology will you im-
plement to meet the requirement?
(A) DHCP snooping
(B) BPDU guard
(C) MAC filtering
(D) Jump server
The jump server acts as a single audit point for traffic and also
a single place where user accounts can be managed. A
prospective administrator must log into the jump server in order
to gain access to the DMZ assets and all access can be logged
176
for later audit.
178
Antivirus is incorrect. Antivirus software helps protect your
computer against malware and cybercriminals. Antivirus soft-
ware looks at data — web pages, files, software, applications
— traveling over the network to your devices. It searches for
known threats and monitors the behavior of all programs, flag-
ging suspicious behavior. It seeks to block or remove malware
as quickly as possible.
180
Question 77. You have been tasked to implement a solution to
increase the security of your company’s local area network
(LAN). All of the company’s external-facing servers (Web
server, Mail server, FTP server) should be placed in a separate
area in order to be accessible from the internet, but the rest of
the internal LAN to be unreachable. Which of the following
techniques will you implement to meet the requirement?
(A) DMZ
(B) VLAN
(C) VPN
(D) DNS
183
Question 78. Application whitelisting prevents undesirable
programs from executing, while application blacklisting is more
restrictive and allows only programs that have been explicitly
permitted to run.
(A) TRUE
(B) FALSE
186
Geolocation is incorrect. Geolocation refers to the use of lo-
cation technologies such as GPS or IP addresses to identify
and track the whereabouts of connected electronic devices.
Because these devices are often carried on an individual’s per-
son, geolocation is often used to track the movements and lo-
cation of people and surveillance.
190
Port mirroring is needed for traffic analysis on a switch be-
cause a switch normally sends packets only to the port to
which the destination device is connected. You configure port
mirroring on the switch to send copies of unicast traffic to a lo-
cal interface or a VLAN and run an analyzer application on a
device connected to the interface or VLAN.
192
Explanation 83. A, B and C are the correct answers.
The correct statements are:
1. SFTP, also known as SSH FTP, encrypts both commands and
data while in transmission.
2. FTPS, also known as FTP Secure or FTP-SSL.
3. SFTP protocol is packet-based as opposed to text-based
making file and data transfers faster.
194
How to reduce broadcast storms:
1. Storm control and equivalent protocols allow you to rate-
limit broadcast packets. If your switch has such a mecha-
nism, turn it on.
4. Check how often ARP tables are emptied. The more fre-
quently they’re emptied, the more often ARP broadcast re-
quests occur.
WPS works only for wireless networks that use a password that
is encrypted with the WPA Personal or WPA2 Personal security
protocols.
199
Question 87. Which of the following options are cryptographic
protocols? (Choose all the apply)
(A) WPA2
(B) WPA3
(C) CCMP
(D) SAE
(E) EAP
(F) PEAP
200
CCMP is the correct answer. Counter Mode with Cipher Block
Chaining Message Authentication Code Protocol (CCMP) is an
encryption protocol that forms part of the 802.11i standard for
wireless local area networks (WLANs), particularly those using
WiMax technology.
201
EAP is incorrect. The Extensible Authentication Protocol (EAP)
is a protocol for wireless networks that expands on authentica-
tion methods used by the Point-to-Point Protocol (PPP), a pro-
tocol often used when connecting a computer to the Internet.
The authentication server asks the access point for proof of the
validity of the ID. After the access point obtains that verification
from the user and sends it back to the authentication server,
the user is connected to the network as requested.
202
Question 88. The main goal of performing a wireless site
________________ is to reveal areas of channel interference and
dead zones, helping you avoid problems as you build the net-
work and prevent obstacles for network users.
(A) Inspection
(B) Survey
(C) Check
(D) Scan
206
Explanation 90. Site-to-site is the correct answer.
The Site to Site VPN, known as point to point VPN, is used to
connect two local area networks (LANs). Site to site VPNs are
usually utilized by businesses large and small that want to pro-
vide their employees or business partners secure access to
network resources. Usually, these network resources are files or
access to programs that need to be protected.
The authentication server asks the access point for proof of the
validity of the ID. After the access point obtains that verification
from the user and sends it back to the authentication server,
the user is connected to the network as requested.
209
RADIUS allows a company to maintain user profiles in a central
database that all remote servers can share. It provides better
security, allowing a company to set up a policy that can be ap-
plied at a single administered network point.
www.yourcompany.com
mail.yourcompany.com
intranet.yourcompany.com
secure.yourcompany.com
me.yourcompany.com
212
Explanation 93. NAT is the correct answer. Network Ad-
dress Translation (NAT) is designed for IP address conserva-
tion. It enables private IP networks that use unregistered IP ad-
dresses to connect to the Internet. NAT operates on a router,
usually connecting two networks together, and translates the
private (not globally unique) addresses in the internal network
into legal addresses before packets are forwarded to another
network.
215
OAuth is incorrect. OAuth is an authentication protocol that
allows you to approve one application interacting with another
on your behalf without giving away your password.
For example, you can tell Facebook that it’s OK for BBC.com to
access your profile or post updates to your timeline without
having to give BBC your Facebook password. This minimizes
risk in a major way: In the event, BBC suffers a breach, your
Facebook password remains safe.
216
Explanation 95. Wildcard is the correct answer.
A Wildcard SSL Certificate allows you to secure an unlimited
number of first-level sub-domains on a single domain name.
That means you can get an SSL Certificate with the common
name as *.yourcompany.com and you can use it on all of the
following without errors:
www.yourcompany.com
mail.yourcompany.com
intranet.yourcompany.com
secure.yourcompany.com
me.yourcompany.com
218
Explanation 96. Self-signed is the correct answer.
A self-signed certificate is a digital certificate that’s not
signed by a publicly trusted certificate authority (CA). This can
include SSL/TLS certificates, code signing certificates, and S/
MIME certificates.
226
Explanation 101. Control is the correct answer.
Access Control List is a network traffic filter that controls in-
coming or outgoing traffic. It works on a set of rules that define
how to forward or block a packet at the router’s interface.
227
Site-to-site is incorrect. The Site to Site VPN, known as point
to point VPN, is used to connect two local area networks
(LANs). Site to site VPNs are usually utilized by businesses
large and small that want to provide their employees or busi-
ness partners secure access to network resources. Usually,
these network resources are files or access to programs that
need to be protected.
228
Question 103. In the form of Role-Based Access Control, data
are accessible or not accessible based on the user’s IP ad-
dress.
(A) TRUE
(B) FALSE
The jump server acts as a single audit point for traffic and also
233
a single place where user accounts can be managed. A
prospective administrator must log in to the jump server in or-
der to gain access to the DMZ assets and all access can be
logged for later audit.
234
CHAPTER 4
OPERATIONS AND
INCIDENT RESPONSE
Questions 107-116
Question 107. You have been noticed that the email server
doesn’t work. Your manager said that someone from the com-
pany changed the DNS records (MX) of the email server. Which
of the following commands will you type to find the new MX
records of the server?
(A) tracert
(B) ipconfig
(C) ping
(D) nslookup
Question 110. PC1 can ping the printer device on the Market-
ing team network but can’t ping the printer on the Sales team
network. Assuming you are working on a Linux environment,
which of the following commands will you type to get details
about the route that packets go through from the PC1 to the
printer on the Sales team network?
(A) traceroute
(B) ifconfig
(C) dig
(D) tracert
Question 115. Which of the following tools can you use to per-
form manual DNS lookups? Assuming you are working on a
Linux environment. (Choose all that apply)
(A) route
(B) pathping
(C) nslookup
(D) dig
(E) ifconfig
238
Answers 107-116
Question 107. You have been noticed that the email server
doesn’t work. Your manager said that someone from the com-
pany changed the DNS records (MX) of the email server. Which
of the following commands will you type to find the new MX
records of the server?
(A) tracert
(B) ipconfig
(C) ping
(D) nslookup
The command that finds the MX records from your email server
is:
$ nslookup -query=mx yourdomain.com
241
Explanation 109. FALSE is the correct answer.
The Wireshark is indeed a tool that captures and analyzes net-
work traffic that goes through your system but is not a com-
mand-line utility. Wireshark is the world’s leading network traf-
fic analyzer and an essential tool for any security professional
or systems administrator. It lets you analyze network traffic in
real-time, and is often the best tool for troubleshooting issues
on your network.
Question 110. PC1 can ping the printer device on the Market-
ing team network but can’t ping the printer on the Sales team
network. Assuming you are working on a Linux environment,
which of the following commands will you type to get details
about the route that packets go through from the PC1 to the
printer on the Sales team network?
(A) traceroute
(B) ifconfig
(C) dig
(D) tracert
242
Explanation 110. traceroute is the correct answer.
The traceroute command is one of the key diagnostic tools for
TCP/IP. It displays a list of all the routers that a packet must go
through to get from the computer where traceroute is run to any
other computer on the Internet.
For example, suppose that the printer on the Sales team net-
work has an IP of 123.123.123.123 then you can use the com-
mand traceroute 123.123.123.123.
243
tracert is incorrect. The command tracert is a utility designed
for displaying the time it takes for a packet of information to
travel between a local computer and a destination IP address or
domain. This answer can be considered as correct but the
question says that you are working on a Linux environment, the
command tracert is used on the Windows environment.
245
Question 112. You need to mitigate all the networking attacks
that exploit open unused TCP ports on your system. Which of
the following command displays active TCP connections and
ports on which the computer is listening?
(A) netstat
(B) arp
(C) route
(D) sn1per
246
route is incorrect. The route command is used to view and
manipulate the IP routing table.
By default, tail returns the last ten lines of each file that it is giv-
en. It may also be used to follow a file in real-time and watch as
new lines are written to it.
252
CHAPTER 5
GOVERNANCE, RISK
AND COMPLIANCE
Questions 117-125
253
Question 119. The _________________ is described as an estimat-
ed frequency of the threat occurring in one year.
(A) Single loss expectancy (SLE)
(B) Annualized loss expectancy (ALE)
(C) Annualized rate of occurrence (ARO)
(D) Business continuity plan
254
Question 122. A ___________________ is a legally enforceable
contract that establishes confidentiality between two parties—
the owner of protected information and the recipient of that in-
formation.
(A) Non-Disclosure Agreement (NDA)
(B) Memorandum of understanding (MOU)
(C) Service-level agreement (SLA)
(D) End of life (EOL)
256
Answers 117-125
259
International Organization for Standardization (ISO) is in-
correct. ISO develops and publishes standards for a vast range
of products, materials, and processes. The organization’s stan-
dards catalog is divided into 97 fields which include healthcare
technology, railway engineering, jewelry, clothing, metallurgy,
weapons, paint, civil engineering, agriculture, and aircraft.
261
Question 120. _________________ is the average time it takes to
recover from a product or system failure. This includes the full
time of the outage—from the time the system or product fails to
the time that it becomes fully operational again.
(A) Recovery point objective (RPO)
(B) Mean time to repair (MTTR)
(C) Recovery Time Objective (RTO)
(D) Mean time between failures (MTBF)
263
The MOU can be seen as the starting point for negotiations as
it defines the scope and purpose of the talks. Such memoranda
are most often seen in international treaty negotiations but also
may be used in high-stakes business dealings such as merger
talks.
For the business using the product, EOL concerns include dis-
posing of the existing product responsibly, transitioning to a dif-
ferent product, and ensuring that disruption will be minimal.
264
Non-Disclosure Agreement (NDA) is incorrect. A Non-Dis-
closure Agreement (NDA) is a legally enforceable contract that
establishes confidentiality between two parties—the owner of
protected information and the recipient of that information. By
signing an NDA, participants agree to protect confidential in-
formation shared with them by the other party.
265
Memorandum of understanding (MOU) is incorrect. A
memorandum of understanding (MOU or MoU) is an agreement
between two or more parties outlined in a formal document. It is
not legally binding but signals the willingness of the parties to
move forward with a contract.
268
Explanation 124. Recovery Time Objective (RTO) is the cor-
rect answer. Recovery Time Objective (RTO) is the duration
of time and a service level within which a business process
must be restored after a disaster in order to avoid unacceptable
consequences associated with a break in continuity.
269
Question 125. _________________ is a strategy that ensures con-
tinuity of operations with minimal service outage or downtime.
It is designed to protect personnel or assets and make sure
they can function quickly when a disaster strikes such as nat-
ural disasters or cyber-attacks.
(A) Single loss expectancy (SLE)
(B) Annualized loss expectancy (ALE)
(C) Annualized rate of occurrence (ARO)
(D) Business continuity plan
271
THE END
272
Enrich your online experience with Exams-
digest.
Your purchase of this product includes free access to all 100+
practice questions online and much more at examsdigest.com.
You will have access for one (1) month. You may also access
our full library of Practice exams and share with other learners.
Send us an email to [email protected] now and start your
online practice experience!
Examsdigest includes:
✓ Access to 1000+ Questions
✓ Access to 150+ Quizzes
✓ 6+ Certification Paths
✓ 24/7 Support
✓ Interactive Interview Questions
✓ Access on the go
About examsdigest.
Examsdigest started in 2019 and haven’t stopped smashing it
since. Examsdigest is a global, education tech-oriented com-
pany that doesn’t sleep. Their mission is to be a part of your life
transformation by providing you the necessary training to hit
your career goals.
273