SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
Run the image through SHA256. Answer: D
Security guard - Proximity reader
Visibility - Accessibility - Neighborhood crime rate
WPA Enterprise
2. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
ID badges
AES and TKIP
Buffer overflow
Blind FTP
3. In which of the following locations would a forensic analyst look to find a hooked process?
Separation of duties
Availability
White box
BIOS
4. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
The web site's public key.
Rogue access point
AC filtering - Disabled SSID broadcast
Hardware RAID 5 - Software RAID 1
5. Which of the following is MOST commonly a part of routine system audits?
User rights and permissions reviews
Accountability
Baseline reporting
War driving
6. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
Spam filters
TPM
Judgment
Clustering
7. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
ACLs
Man-in-the-middle
Chain of custody
User rights and permissions reviews
8. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
Determine open ports
Humidity
The web site's private key.
DMZ
9. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Cross-site scripting
Spear phishing
The PC has become part of a botnet.
Detective
10. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
ICMP
Shielding
User rights
Check if relaying is denied for unauthorized domains
11. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m
Virtual servers have the same information security requirements as physical servers.
Shielding
The new access point was mis-configured and is interfering with another nearby access point.
To ensure that staff understands what data they are handling and processing
12. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
Forward to different RDP listening ports.
quantitative risk assessment
SSH
Bluesnarfing
13. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Logic Bomb
content inspection.
S/MIME PGP
EMI shielding
14. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Dumpster diving - Shoulder surfing
Footprinting
Implicit deny
Buffer overflow
15. Which of the following reduces the likelihood of a single point of failure when a server fails?
Clustering
Organize data based on severity and asset value.
NOOP instructions
Humidity
16. Which of the following includes a photo and can be used for identification?
Configure the IE popup blockers
Social Engineering attack
CAC
Check if relaying is denied for unauthorized domains
17. Which of the following should NOT be used with username/password authentication?
Cognitive passwords
SNMP (also use to monitor the parameters of network devices)
The user's PC is missing the authentication agent.
The web site's private key.
18. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
Phishing techniques
Disable unused ports
Location that meets power and connectivity requirementsdatacenter
Rogue access point
19. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Loop protection
Organize data based on severity and asset value.
Availability
It is used to provide data encryption for WAP connections.
20. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
MAC address
Cognitive passwords
System A fails open. System B fails closed.
War driving
21. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
WPA2-PSK
Dumpster diving
EMI shielding
Decrease the power levels on the WAP
22. Which of the following uses TCP port 22 by default?
Virtual servers have the same information security requirements as physical servers.
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
TLS
To minimize the organizational risk posed by users
23. How does a NAT server help protect your network?
Command injection
By masking the IP address of internal computers from the Internet
Firewall - VPN
User rights
24. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
Blind FTP
IPv6
Fraud
Add input validation to forms.
25. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi
se file servers attached to an NAS system.
Principle of least privilege
Information disclosure
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
26. Which of the following is the default rule found in a corporate firewall's access control list?
Deny all
DES
CAC
Gas
27. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
MAC address
Symmetric Key
Separation of duties
Availability
28. Which of the following is a technique designed to obtain information from a specific person?
Rogue access points
Birthday - Full name
Spear phishing
DNS spoofing
29. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?
MAC
Phishing techniques
Multi-factor authentication.
IKE
30. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Loop protection
Multi-factor authentication.
Spear phishing
Add input validation to forms.
31. Performing routine security audits is a form of which of the following controls?
Validate input to remove hypertext
HSM
Detective
Only the message data is encrypted
32. Which of the following describes when forensic hashing should occur on a drive?
Add input validation to forms.
Vulnerability scan
Before and after the imaging process and then hash the forensic image
Location that meets power and connectivity requirementsdatacenter
33. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
War driving
Clean desk policy
Mandatory vacations
TPM
34. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
Mantrap
Forward to different RDP listening ports.
Cognitive passwords
Off-site backup
35. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
Visibility - Accessibility - Neighborhood crime rate
Gas
Security guard - Proximity reader
Buffer overflow
36. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
Fraud
User rights and permissions reviews
MAC
Whaling
37. What types of encryption are used for adding a digital signature to a message?
Shoulder surfing
The new access point was mis-configured and is interfering with another nearby access point.
A system that stops an attack in progress.
Asymmetric and Hashing
38. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.
Cross-site scripting
Diffie-Hellman
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Polymorphic
39. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
Fiber optic
DoS
Forward to different RDP listening ports.
Integrity and Authentication
40. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?
Mantraps
Decrease the power levels on the WAP
Deny all
Disable unused ports
41. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Privacy policy
Pharming - Logic bomb
MAC filtering
Symmetric Key
42. Which of the following protocols requires the use of a CA based authentication process?
Multi-factor authentication.
PEAP-TLS
WPA Enterprise
Bluesnarfing
43. Which of the following allows a security administrator to set device traps?
Run the image through SHA256. Answer: D
Off-site backup
SNMP (also use to monitor the parameters of network devices)
Judgment
44. A system administrator could have a user level account and an administrator account to prevent:...
smurf attacks
Segmentation of each wireless user from other wireless users
escalation of privileges.
Firewall rulesflow of network traffic at the edge of the network
45. Which of the following are accomplished when a message is digitally signed?
Integrity and Authentication
Vulnerability scanning
To ensure that staff understands what data they are handling and processing
Check if relaying is denied for unauthorized domains
46. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
Business impact analysis
ARP poisoning
Loop protection
IDS
47. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
WPA Enterprise
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Mandatory vacation
Business impact analysis
48. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Protocol analyzer
Asset value
AC filtering - Disabled SSID broadcast
49. Used in conjunction which of the following are PII?
Birthday - Full name
WPA2
Information disclosure
AES and TKIP
50. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Blind FTP
Hardware RAID 5 - Software RAID 1
IPSec
Buffer overflow