SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following MUST a programmer implement to prevent cross-site scripting?
Privilege escalation
CCTV
mitigation - acceptance - transference
Validate input to remove hypertext
2. Isolation mode on an AP provides which of the following functionality types?
Evil twin
VLAN
Segmentation of each wireless user from other wireless users
Rogue access point
3. Which of the following identifies some of the running services on a system?
Determine open ports
Ensure a proper chain of custody
Shoulder surfing
To minimize the organizational risk posed by users
4. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?
Mantraps
Decrease the power levels on the WAP
Protocol analyzer
Block port 23 on the network firewall.
5. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Enact a policy banning users from bringing in personal music devices.
Load balancer
Spear phishing
A system that stops an attack in progress.
6. Which of the following BEST describes the proper method and reason to implement port security?
Trojans
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
AES and TKIP
Whaling
7. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Shoulder surfing
CAC
Baseline reporting
NOOP instructions
8. What port does the Domain Name Service (DNS) use by default?
Pharming - Logic bomb
Information disclosure
53
Disable unused services - Update HIPS signatures
9. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Organize data based on severity and asset value.
ID badges
Bluesnarfing
Firewall - VPN
10. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
TLS
Run the image through SHA256. Answer: D
PEAP-TLS
22
11. What allows for all activities on a network or system to be traced to the user who performed them?
Separation of duties
Physical control of the data
Accountability
Rogue access points
12. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
Configure the IE popup blockers
Whaling
PEAP-TLS
Video surveillance
13. What is the advantage of using application virtualization?
DMZ
Principle of least privilege
MAC filtering
Lets you minimize the attack surface relating to the application
14. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
MD5
Tailgating
WPA2-PSK
DoS
15. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
Platform as a Service
Rogue access point
MAC
War driving
16. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
quantitative risk assessment
Add input validation to forms.
Separation of duties
Symmetric
17. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
SSH
Baseline reporting
CAC
Detective
18. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
S/MIME PGP
ID badges
Physical control of the data
Privilege escalation
19. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Integrity
VLAN segregation
Implicit deny
Baseline reporting
20. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Provider cloud
ARP poisoning
Integrity
Man-in-the-middle
21. Which of the following uses TCP port 22 by default?
Whaling
Polymorphic
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Integrity
22. Which environmental control is part of TEMPEST compliance?
Bluesnarfing
Shielding
Steganography
Least privilege
23. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
Software as a Service (SaaS)
The development team is transferring data to test systems using SFTP and SCP.
Change Management System
EMI shielding
24. The detection of a NOOP sled is an indication of which of the following attacks?
Ensure a proper chain of custody
PEAP-TLS
Buffer overflow
Vulnerability scanning
25. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
User rights
Chain of custody
Fraud
TCP SYN flood attack
26. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Risk transference
VLAN
Multi-factor authentication.
Pharming - Logic bomb
27. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Having the offsite location of tapes also be the hot siteservers
Protocol analyzer
IPSec
Least privilege
28. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
Forward to different RDP listening ports.
The development team is transferring data to test systems using SFTP and SCP.
Having the offsite location of tapes also be the hot siteservers
Footprinting
29. Which of the following should be enabled to ensure only certain wireless clients can access the network?
53
Buffer overflow
MAC filtering
IKE
30. You are performing risk assessment for an organization. What should you do during impact assessment?
Cross-site scripting
Least privilege
Determine the potential monetary costs related to a threat
Footprinting
31. Which of the following includes a photo and can be used for identification?
CAC
Algorithm
IPv6
extremely slow and numerous antivirus alerts
32. Which of the following concepts ensures that the data is only viewable to authorized users?
The user's PC is missing the authentication agent.
Confidentiality
ID badges
content inspection.
33. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
Before and after the imaging process and then hash the forensic image
Blind FTP
Evil twin
ID badges
34. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Decrease the power levels on the WAP
Having the offsite location of tapes also be the hot siteservers
Content filtering
Vishing
35. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
Principle of least privilege
53
MS-CHAP
MAC
36. What types of encryption are used for adding a digital signature to a message?
Spear phishing
Virtual servers have the same information security requirements as physical servers.
Asymmetric and Hashing
Disable unused ports
37. Which of the following port numbers is used for SCP by default?
Hierarchical list of critical systems
22
DNS spoofing
Power levels
38. Which of the following is a method to prevent ad-hoc configuration mistakes?
ICMP
Implement a change management strategy
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Principle of least privilege
39. Which of the following are the default ports for HTTP and HTTPS protocols?
DMZ
Use SSH to connect to the Linux shell
Hot and cold aisles
80 - 443
40. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
Off-site backup
Implement a change management strategy
SSL
Phishing techniques
41. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?
Principle of least privilege
Deny all
IPSec
Loop protection
42. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
Mandatory vacations
A system that stops an attack in progress.
Spear phishing
BIOS
43. Which of the following access control models allows classification and labeling of objects?
MAC
Steganography
DES
signing of a user agreement.
44. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
Baseline reporting
IPv6
Integrity and Authentication
Segmentation of each wireless user from other wireless users
45. Which of the following protocols requires the use of a CA based authentication process?
MD5
PEAP-TLS
Separation of duties
MAC address
46. A system administrator could have a user level account and an administrator account to prevent:...
Mantrap
escalation of privileges.
Determine open ports
TPM
47. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
Hardware RAID 5 - Software RAID 1
The development team is transferring data to test systems using SFTP and SCP.
Spear phishing
Footprinting
48. Which of the following is not an asymmetric system?
Proxies
Asset value
DES
Steganography
49. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
Principle of least privilege
The PC has become part of a botnet.
DES
Whaling
50. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
Physical control of the data
TCP SYN flood attack
SSH
IPSec
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests