Practice Test Questions

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Which of the following types of information may be collected by a mobile device management (MDM) solution? A. User identity, geographic location, applications installed, and call history B.   User identity, applications installed, and call history C.     Call history only D.    Applications installed and call history Correct Answer: A Mobile device management (MDM) solutions have deep access to mobile devices and are capable of collecting any information available on the device. This may include call history, user identity, geographic location, and application data. The specific capabilities will depend upon the MDM solution used.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Paul is looking for a free solution that will aggregate the security logs from devices across his organization. Which one of the following tools would best meet his needs? A. Journalctl B. Syslog C. NXlog D. Wireshark Correct Answer: C NXlog is a log management tool available in a free, open-source edition that would meet Paul's needs. So, this is our correct answer. Syslog is a format used to exchange log messages and not a log aggregation solution. Journalctl is a command-line utility used to view system logs. Wireshark is a protocol analyzer used to sniff network traffic   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Which one of the following is not a constraint commonly found in specialized IoT devices? A. Inability to patch B. Limited Power C. Limited Compute D. Lack of Connectivity Correct Answer: D IoT devices are often limited in size and power capacity, limiting their on-board functionality, including their compute capacity. They also often are difficult to patch and maintain to current security standards. They do, by design, normally have sufficient network capacity so that they can connect back to more powerful systems and cloud networks. So, this is our correct answer.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...