Yeah, definitely A here. Social engineering relies on manipulating people, not physical objects, so a security guard is the obvious weak link compared to stuff like bollards or biometric locks. Pretty sure CompTIA wants us to focus on the human factor for these types of questions. Agree?
Q: 1
Which of the following types of physical security controls would most likely be a target of a social
engineering attack?
Options
Discussion
Its A, not D. Social engineering tricks people, not physical devices like biometrics or bollards.
Probably A. Social engineering works best on people, so security guards can be tricked more easily than equipment or barriers.
Be respectful. No spam.
Q: 2
Which of the following policies would be BEST to deter a brute-force login attack?
Options
Discussion
Option A lots of practice exams point to password complexity as a brute-force deterrent. Official guide covers it under authentication hardening.
C isn’t right for this, A is better. Password complexity would slow down brute-force since easy passwords are way easier to guess.
It’s D since account lockout stops brute-force attempts by limiting the number of failed logins. The other options don’t directly prevent repeated guessing. Pretty sure on this one but let me know if you disagree.
Be respectful. No spam.
Q: 3
An administrator needs to perform bare-metal maintenance on a server in a remote datacenter.
Which of the following should the administrator use to access the server’s console?
Options
Discussion
Its A, only IP KVM lets you get into BIOS or do full bare-metal stuff remotely. The others need the OS running.
A had something like this in a mock. None of the others let you hit BIOS remotely if the OS is down.
This is asking specifically about bare-metal maintenance, so does the server have any OS installed or is it totally unprovisioned? If there’s no OS at all, only something like an IP KVM (A) would work since VNC, RDP, and SSH need a running OS. If the server already has remote access utilities set up, the answer could change.
Be respectful. No spam.
Q: 4
A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning
properly. Which of the following is the MOST likely system vulnerability?
Options
Discussion
A is the one that stands out to me. If AV and firewalls are solid, insider threats are still a risk since those controls can't catch someone abusing their legitimate access. Pretty sure that's what they're fishing for here, but open to other ideas.
A for sure. Firewalls and AV stop external stuff, but not someone already inside with legit access. Makes sense right?
Seen something like this pop up on practice tests too. A
Be respectful. No spam.
Q: 5
Which of the following must a server administrator do to ensure data on the SAN is not compromised
if it is leaked?
Options
Discussion
B tbh
Be respectful. No spam.
Q: 6
A technician is configuring a server that requires secure remote access. Which of the following ports
should the technician use?
Options
Discussion
Option B is right since port 22 means SSH, which is secure remote access. But if the question asked for web-based remote admin (like HTTPS), D (443) would make more sense, so does it mean CLI or browser access?
D tbh
Be respectful. No spam.
Q: 7
Which of the following is typical of software licensing in the cloud?
Options
Discussion
Its C, since most cloud software uses subscription-based licensing these days. Perpetual or per socket is super rare in the cloud.
Man, CompTIA loves throwing these. C imo, cloud stuff is almost always subscription-based now.
Be respectful. No spam.
Q: 8
Which of the following open ports should be closed to secure the server properly? (Choose two.)
Options
Discussion
Its A and C. 21 is FTP and 23 is Telnet, both send data unencrypted. I think some might pick B (SSH) but that's actually needed for secure admin access.
Probably A and C. FTP and Telnet both use plain text so they should be closed first for security. Makes sense, right?
Option A and C. Both FTP (21) and Telnet (23) are insecure by default, so best to close them.
Be respectful. No spam.
Q: 9
Which of the following would be BEST to help protect an organization against social engineering?
Options
Discussion
Probably B here. Social engineering targets people, so technical stuff like complex passwords (A) or SSO (C) won’t really stop someone from being tricked. Recurring training and support actually helps users spot the scams. D isn’t enough, since policy alone won’t change behavior like regular awareness training will. Open to other views if I missed something, but pretty sure it’s B.
D imo, had something like this in a mock and chose D.
Be respectful. No spam.
Q: 10
A systems administrator is setting up a new server that will be used as a DHCP server. The
administrator installs the OS but is then unable to log on using Active Directory credentials.The
administrator logs on using the local administrator account and verifies the server has the correct IP
address, subnet mask, and default gateway. The administrator then gets on another server and can
ping the new server. Which of the following is causing the issue?
Options
Discussion
Probably D here. If you can't log in with AD credentials but local works, that's usually a sign the server isn't joined to the domain. A and B are common traps, but network seems fine since the other server can ping it.
Does the question specify if "best" or "first" action is needed? That changes my pick, maybe D.
D
D Server has to be joined to the domain for AD logon, seen this a lot.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2