SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following assists in identifying if a system was properly handled during transport?
It is used to provide data encryption for WAP connections.
Load balancer
Judgment
Chain of custody
2. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Least privilege
Physical control of the data
IDEA and TripleDes
WPA2
3. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Asset value
Privilege escalation
Command injection
User rights and permissions reviews
4. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
Spear phishing
Load balancer
1433
User rights
5. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
To minimize the organizational risk posed by users
Separation of duties
TLS
NIDS
6. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
ACLs
Dumpster diving - Shoulder surfing
EMI shielding
ARP poisoning
7. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
CAC
To minimize the organizational risk posed by users
EMI shielding
Multi-factor authentication.
8. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
Determine the potential monetary costs related to a threat
MAC address
Spam filters
S/MIME PGP
9. Webmail is classified under which of the following cloud-based technologies?
Diffie-Hellman
Software as a Service (SaaS)
Hierarchical list of critical systems
Organize data based on severity and asset value.
10. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
Evil twin
Hardware RAID 5 - Software RAID 1
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
User rights
11. Which of the following is used for exchanging secret keys over an insecure public network?
Black hat
IKE
Diffie-Hellman
DMZ
12. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
Block port 23 on the network firewall.
quantitative risk assessment
NIPS is blocking activities from those specific websites.
Botnet
13. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
The development team is transferring data to test systems using SFTP and SCP.
NIPS is blocking activities from those specific websites.
AC filtering - Disabled SSID broadcast
Content filtering
14. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.
Deny all
It is used to provide data encryption for WAP connections.
Asset value
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
15. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
TLS
SSL
Configure the IE popup blockers
Mandated security configurations have been made to the operating system.
16. Which of the following environmental variables reduces the potential for static discharges?
Vishing
Vulnerability scanning
Humidity
A worm is self-replicating
17. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
WPA2
WPA2-PSK
Forward to different RDP listening ports.
Run the image through SHA256. Answer: D
18. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?
IPSec
CAC
53
Loop protection
19. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
Vulnerability scanning
Video surveillance
Shoulder surfing
Security guard - Proximity reader
20. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Power levels
Fiber optic
Buffer overflow
ARP poisoning
21. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
IPSec
To minimize the organizational risk posed by users
Detective
Provider cloud
22. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
Add input validation to forms.
Evil twin
Spear phishing
PEAP-TLS
23. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Hot and cold aisles
DNS spoofing
Video surveillance
Symmetric Key
24. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
Change Management System
VPN concentrator
The server is missing the default gateway.
IPSec
25. A company that purchases insurance to reduce risk is an example of which of the following?
Information disclosure
Risk transference
Loop protection
Provider cloud
26. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
Deny all
Only the message data is encrypted
IDS
VLAN
27. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?
The server is missing the default gateway.
Run the image through SHA256. Answer: D
Decrease the power levels on the WAP
MD5
28. Which of the following is a method to prevent ad-hoc configuration mistakes?
Block port 23 on the network firewall.
Shielding
CAC
Implement a change management strategy
29. What allows for all activities on a network or system to be traced to the user who performed them?
NOOP instructions
Spear phishing
Accountability
PEAP-TLS
30. Which of the following is MOST commonly a part of routine system audits?
Cross-site scripting
Deny all
User rights and permissions reviews
Tailgating
31. Which of the following would need to be configured correctly to allow remote access to the network?
Tailgating
ACLs
Trojans
DMZ
32. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
To provide documentation as to who has handled the evidence
Detective
The development team is transferring data to test systems using SFTP and SCP.
AES and TKIP
33. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Least privilege
WPA Enterprise
Information disclosure
Organize data based on severity and asset value.
34. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
DAC
Ensure a proper chain of custody
Buffer overflow
Botnet
35. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Mandatory vacation
ARP poisoning
25
AC filtering - Disabled SSID broadcast
36. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
Change Management System
Before and after the imaging process and then hash the forensic image
Rootkit
SYN attacks
37. Which of the following is the MOST secure method of utilizing FTP?
Buffer overflow
FTPS
Implement a change management strategy
IPSec
38. Which of the following risks may result from improper use of social networking and P2P software?
VLAN
Accountability
Information disclosure
Tailgating
39. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
Software as a Service
Mantraps
Fraud
Disable unused ports
40. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Mandatory vacation
Spear phishing
IDS
Load balancer
41. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Firewall - VPN
CAC
WPA2-PSK
Footprinting
42. A system administrator could have a user level account and an administrator account to prevent:...
Vulnerability scanning
Fault tolerance
Gas
escalation of privileges.
43. How does a NAT server help protect your network?
Only the message data is encrypted
By masking the IP address of internal computers from the Internet
Cross-site scripting
War driving
44. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. Which of the following is the MAIN reason to require data labeling?
Dumpster diving
To ensure that staff understands what data they are handling and processing
Confidentiality - Availability
Platform as a Service
46. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m
Load balancer
VLAN
S/MIME PGP
The new access point was mis-configured and is interfering with another nearby access point.
47. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Tailgating
Cross-site scripting
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Integrity
48. Which of the following manages peer authentication and key exchange for an IPSec connection?
IKE
Software as a Service
escalation of privileges.
Determine the potential monetary costs related to a threat
49. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
Information disclosure
System A fails open. System B fails closed.
IDEA and TripleDes
Spear phishing
50. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Buffer overflow
Integrity
Platform as a Service
IPv6