SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. L2TP port number
1. John the Ripper 2. Cain & Abel 3. THC Hydra
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1701
3389
2. UPS Types
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
BitLocker
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
80
3. What is a hotfix?
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
23
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
49
4. What do digital signatures prove?
The integrity of a message.
(2^number of host bits)-2 = number of hosts
In Windows NT 4 SP4.
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
5. Weaknesses of Antivirus Software
49
110
1. Signatures must be updated 2. Zero day exploits
In Windows NT 4 SP4.
6. Examples of Social Engineering Attacks
BitLocker
22
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
7. Password Crackers
A fast network authentication password cracker that can go after many different services.
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
23
1. John the Ripper 2. Cain & Abel 3. THC Hydra
8. Human Behaviors that Social Engineering Will Exploit
X.509 is the standard that covers PKI
1. Trust 2. Fear 3. Lack of konwledge
1723
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
9. Can a VLAN be used to SEGREGATE access to a DHCP server?
1. Trust 2. Fear 3. Lack of konwledge
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
10. LDAP port number
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
389
110
11. DHCP port number
67 - 68
The integrity of a message.
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
12. Symmetric Key Ciphers
The integrity of a message.
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
13. Symmetric Key Ciphers
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
A fast network authentication password cracker that can go after many different services.
1. Trust 2. Fear 3. Lack of konwledge
110
14. Protocols Used for VPN
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
1. Something you know2. Something you have 3. Something you are
15. Can PGP be used to provide nonrepudiation?
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
C:Windowssystem32driversetcservices
16. The 3 Ss
X.509 is the standard that covers PKI
1. Something you know2. Something you have 3. Something you are
Are the same thing.
389
17. TACACS port number
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
49
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
18. What is THC Hydra?
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
A fast network authentication password cracker that can go after many different services.
Unsolicited Bulk Email or SPAM
1701
19. How does a differential backup work?
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
20. POP3 port number
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
110
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
21. The 3 As
67 - 68
1701
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
1. Authentication 2. Authorization 3. Accounting
22. Do all hosts on a VLAN have to be connected to the same switch?
1. Something you know2. Something you have 3. Something you are
80
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
23. What formula is used to find the number of hosts?
The integrity of a message.
(2^number of host bits)-2 = number of hosts
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
24. Types of Firewalls
1. John the Ripper 2. Cain & Abel 3. THC Hydra
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
25. Remote Desktop port number
3389
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
BitLocker
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
26. In a Windows Doamin - How is a GPO Applied?
23
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. Elevation Prompt 2. Privilege Elevation
27. Types of L2TP Tunnels
25
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
28. Access Control Models
Unsolicited Bulk Email or SPAM
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
110
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
29. Versions of NAT
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
(2^number of host bits)-2 = number of hosts
110
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
30. How does the MAC model work?
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
1723
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
31. Ways to Secure a WiFi Access Point
Unsolicited Bulk Email or SPAM
X.500 is the standard that covers LDAP
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
32. Steps in the OVAL Assessment Process
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
Unsolicited Bulk Email or SPAM
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
33. What is output validation?
34. What is UBE?
Are the same thing.
Unsolicited Bulk Email or SPAM
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
35. What is the name of Vista's hard drive encryption technology?
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
110
BitLocker
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
36. Checksums
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
37. The Goals of Security
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
1. Confidentiality 2. Integrity 3. Availability
1. Trust 2. Fear 3. Lack of konwledge
22
38. What is PWDUMP?
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
Through the use of digital signatures
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
1. John the Ripper 2. Cain & Abel 3. THC Hydra
39. SMTP port number
1. Elevation Prompt 2. Privilege Elevation
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
25
(2^number of host bits)-2 = number of hosts
40. What is the standard that covers PKI?
X.509 is the standard that covers PKI
1. Something you know2. Something you have 3. Something you are
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
41. How can you identify a SQL Injection attack?
389
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
3389
42. What is the standard that covers LDAP?
X.500 is the standard that covers LDAP
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
Yes a VLAN can provide scalability because it is configured via software not hardware.
1. Something you know2. Something you have 3. Something you are
43. What is a Zombie?
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
X.500 is the standard that covers LDAP
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
44. What is the difference between an online UPS and a double conversion UPS?
143
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
80
Are the same thing.
45. IPSEC Encryption Modes
1. John the Ripper 2. Cain & Abel 3. THC Hydra
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
46. What is the SLE (Single Loss Expectancy)?
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
Use a solution that supports nonrepudiation
143
X.500 is the standard that covers LDAP
47. What is a Trojan?
1. Authentication 2. Authorization 3. Accounting
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
The integrity of a message.
48. SSH port number
22
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
X.500 is the standard that covers LDAP
49. Telnet port number
X.500 is the standard that covers LDAP
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
X.509 is the standard that covers PKI
23
50. Can a VLAN provide scalability?
Yes a VLAN can provide scalability because it is configured via software not hardware.
1. Trust 2. Fear 3. Lack of konwledge
1723
443