CompTIA Security+ Practice Test 5 SY0-401 CompTIA Security+ Practice Test 5 SY0-401 Which of the following should be used when a business needs a block cipher with minimal key size for internal encryption? A. AES B. Blowfish C. RC5 D. 3DES A risk has the following calculated values (SLE = $1,500, ARO = 5). What is the maximum amount that should be spent to fully negate the costs of this risk? A. $300 B. $500 C. $1,500 D. $7,500 Which two of the following support the preservation of data availability? A. Anti-static carpet B. Firewall C. Mirrored windows D. Physical access control Running which of the following commands is the quickest way to tell which ports are open and which services are running on the machine? A. netstat B. nbtstat C. ipconfig D. msconfig You are performing a risk assessment of an organization and decide that the likelihood of a particular risk materializing is “low.” What type of risk assessment are you performing? A. Operational B. Quantitative C. Technical D. Qualitative Where would you turn off file sharing in Windows Vista? A. Control Panel B. Local Area Connection C. Network and Sharing Center D. Firewall properties Which of the following best describes the activity that involves collecting information used for monitoring and reviewing purposes? A. Auditing B. Logging C. Baselining D. Inspecting Which of the following uses TCP / UDP port 53 by default? A. DNS B. SFTP C. SSH D. NetBIOS Physically unsecured equipment is vulnerable to which of the following type of attacks? A. Brute force B. Social engineering C. Malware D. Rootkits You are using encryption technology in an attempt to protect a file containing customer credit card numbers from unauthorized access. What information security goal are you pursuing? A. Confidentiality B. Integrity C. Disclosure D. Availability Loading … Question 1 of 10 More Tests A+ Practice Test A+ 220-901 and 220-902 Practice Test Network+ Practice Test Security+ Practice Test