SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
Mantraps
WPA2
Bluesnarfing
NOOP instructions
2. Which of the following is the BEST way to secure data for the purpose of retention?
Proxies
Off-site backup
Disable unused ports
Evil twin
3. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
Block port 23 on the network firewall.
Organize data based on severity and asset value.
Smurf attack
Clean desk policy
4. Which of the following can prevent an unauthorized employee from entering a data center?
Rootkit
Security guard - Proximity reader
Vulnerability scan
A system that stops an attack in progress.
5. Which of the following is another name for a malicious attacker?
Black hat
Change Management System
HSM
Firewall - VPN
6. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?
Footprinting
signing of a user agreement.
Spear phishing
Decrease the power levels on the WAP
7. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
VLAN segregation
TPM
NIPS is blocking activities from those specific websites.
Mantrap
8. Which of the following are accomplished when a message is digitally signed?
Integrity and Authentication
Spear phishing
Forward to different RDP listening ports.
quantitative risk assessment
9. Which of the following is the MOST secure method of utilizing FTP?
FTPS
Trojans
Load balancer
Block port 23 on the network firewall.
10. Risk can be managed in the following ways...
TLS
Pharming - Logic bomb
DAC
mitigation - acceptance - transference
11. Which of the following assists in identifying if a system was properly handled during transport?
Add input validation to forms.
Configure the IE popup blockers
Chain of custody
Steganography
12. Which of the following is a detective security control?
Confidentiality - Availability
Implicit deny
Enact a policy banning users from bringing in personal music devices.
CCTV
13. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Load balancer
Use SSH to connect to the Linux shell
Information disclosure
CCTV
14. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
Provider cloud
VLAN
FTPS
extremely slow and numerous antivirus alerts
15. Which of the following devices would allow a technician to view IP headers on a data packet?
Protocol analyzer
Hardware RAID 5 - Software RAID 1
Mandatory vacations
DES
16. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Determine the potential monetary costs related to a threat
Vishing
Vulnerability scan
Run the image through SHA256. Answer: D
17. Which of the following allows a security administrator to set device traps?
Power levels
The server is missing the default gateway.
Off-site backup
SNMP (also use to monitor the parameters of network devices)
18. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
MAC address
Cross-site scripting
Rootkit
Vulnerability scan
19. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Bluesnarfing
Tailgating
Dumpster diving - Shoulder surfing
content inspection.
20. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
DNS spoofing
Software as a Service (SaaS)
Buffer overflow
The PC has become part of a botnet.
21. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
DoS
Logic Bomb
Hardware RAID 5 - Software RAID 1
quantitative risk assessment
22. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Humidity
Tailgating
IPSec
Pharming - Logic bomb
23. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Judgment
Platform as a Service
WPA Enterprise
Pharming - Logic bomb
24. Which of the following is a best practice when securing a switch from physical access?
Hierarchical list of critical systems
Vulnerability scanner
Disable unused ports
25
25. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
Segmentation of each wireless user from other wireless users
Cross-site scripting
MAC address
Vulnerability scanning
26. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
The PC has become part of a botnet.
Vulnerability scanning
Vishing
ARP poisoning
27. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
The remote router has ICMP blocked.
Check if relaying is denied for unauthorized domains
DMZ
MAC address
28. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Enact a policy banning users from bringing in personal music devices.
Security guard - Proximity reader
Footprinting
White box
29. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
By masking the IP address of internal computers from the Internet
Steganography
The user's PC is missing the authentication agent.
Configure the IE popup blockers
30. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
Integrity and Authentication
Privacy policy
ACLs
Tailgating
31. Which of the following is a method to prevent ad-hoc configuration mistakes?
WPA2-PSK
Dumpster diving - Shoulder surfing
Firewall - VPN
Implement a change management strategy
32. Which of the following describes when forensic hashing should occur on a drive?
Before and after the imaging process and then hash the forensic image
Add input validation to forms.
Spam filters
Organize data based on severity and asset value.
33. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
Shielding
User rights
Disable unused services - Update HIPS signatures
Clustering
34. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Baseline reporting
Having the offsite location of tapes also be the hot siteservers
Privilege escalation
Visibility - Accessibility - Neighborhood crime rate
35. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
Deny all
AC filtering - Disabled SSID broadcast
Forward to different RDP listening ports.
Implicit deny
36. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Black hat
CAC
The server is missing the default gateway.
Command injection
37. Which environmental control is part of TEMPEST compliance?
Phishing techniques
Privacy policy
signing of a user agreement.
Shielding
38. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
Cross-site scripting
Memory - network processes - and system processesserver. If the computer is powered off
Mantrap
IKE
39. Which of the following is MOST commonly a part of routine system audits?
To minimize the organizational risk posed by users
User rights and permissions reviews
Spear phishing
se file servers attached to an NAS system.
40. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
War driving
SSH
Content filtering
Shoulder surfing
41. Used in conjunction which of the following are PII?
IPSec
TPM
Birthday - Full name
Change Management System
42. Which of the following reduces the likelihood of a single point of failure when a server fails?
Asset value
Gas
Footprinting
Clustering
43. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
SSH
Block port 23 on the network firewall.
Cognitive passwords
Asymmetric and Hashing
45. What allows for all activities on a network or system to be traced to the user who performed them?
MD5
FTPS
Judgment
Accountability
46. Which of the following facilitates computing for heavily utilized systems and networks?
Enact a policy banning users from bringing in personal music devices.
Rogue access points
Dumpster diving - Shoulder surfing
Provider cloud
47. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
A worm is self-replicating
HSM
ICMP
Determine open ports
48. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
Principle of least privilege
TPM
Protocol analyzer
Determine the potential monetary costs related to a threat
49. You are performing risk assessment for an organization. What should you do during impact assessment?
Mantrap
Firewall - VPN
Determine the potential monetary costs related to a threat
Information disclosure
50. How does a NAT server help protect your network?
AES and TKIP
By masking the IP address of internal computers from the Internet
Accountability
CAC