SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following allows a security administrator to set device traps?
Separation of duties
Ensure a proper chain of custody
Validate input to remove hypertext
SNMP (also use to monitor the parameters of network devices)
2. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Rogue access points
Footprinting
Configure the IE popup blockers
MAC
3. Which of the following is used when performing a quantitative risk analysis?
Software as a Service
Asset value
Buffer overflow
Video surveillance
4. Which of the following includes a photo and can be used for identification?
MAC
Vishing
Hierarchical list of critical systems
CAC
5. Upper management decides which risk to mitigate based on cost. This is an example of:
quantitative risk assessment
MAC filtering
MD5
Evil twin
6. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?
Separation of duties
Rogue access points
Fault tolerance
DMZ
7. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
IKE
Separation of duties
Baseline reporting
Fiber optic
8. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Vulnerability scan
Enact a policy banning users from bringing in personal music devices.
Risk assessmentproduct Answer: D
ID badges
9. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
To minimize the organizational risk posed by users
Only the message data is encrypted
Video surveillance
10. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
IPSec
Whaling
Run the image through SHA256. Answer: D
Symmetric Key
11. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Mantrap
DES
VLAN
IKE
12. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
Polymorphic
Spam filters
Integrity
Data Encryption Standard (DES)
13. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Asset value
ICMP
1433
MAC
14. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
Steganography
VLAN segregation
Video surveillance
Software as a Service
15. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
Rootkit
Principle of least privilege
Spear phishing
Privilege escalation
16. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Vulnerability scan
Enact a policy banning users from bringing in personal music devices.
Implicit deny
The remote router has ICMP blocked.
17. Which of the following should be performed on a computer to protect the operating system from malicious software?
Disable unused services - Update HIPS signatures
WPA2-PSK
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Vishing
18. Which of the following risks may result from improper use of social networking and P2P software?
TLS
Information disclosure
A system that stops an attack in progress.
Algorithm
19. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
Spear phishing
Ensure a proper chain of custody
Platform as a Service
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
20. Which of the following assists in identifying if a system was properly handled during transport?
ACLs
Fraud
IPSec
Chain of custody
21. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
Separation of duties
Cross-site scripting
MAC filtering
Firewall - VPN
22. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
VLAN segregation
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
HSM
signing of a user agreement.
23. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?
Shoulder surfing
Lets you minimize the attack surface relating to the application
Loop protection
The user's PC is missing the authentication agent.
24. A company that purchases insurance to reduce risk is an example of which of the following?
MAC
Symmetric Key
1433
Risk transference
25. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Cross-site scripting
Privilege escalation
AC filtering - Disabled SSID broadcast
Fault tolerance
26. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
SNMP (also use to monitor the parameters of network devices)
IKE
DoS
IPSec
27. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Botnet
Cross-site scripting
Location that meets power and connectivity requirementsdatacenter
The remote router has ICMP blocked.
28. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Firewall - VPN
Bluesnarfing
Determine open ports
NIDS
29. Performing routine security audits is a form of which of the following controls?
Trojans
Detective
Off-site backup
Social Engineering attack
30. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Rootkit
Botnet
Spam filters
DNS spoofing
31. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. Which of the following can prevent an unauthorized employee from entering a data center?
Security guard - Proximity reader
IPv6
A worm is self-replicating
Software as a Service
33. Which of the following is a best practice when securing a switch from physical access?
content inspection.
Hierarchical list of critical systems
Disable unused ports
The web site's private key.
34. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
Buffer overflow
A worm is self-replicating
AC filtering - Disabled SSID broadcast
The remote router has ICMP blocked.
35. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Mantrap
Confidentiality - Availability
Vishing
Hierarchical list of critical systems
36. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
smurf attacks
Algorithm
Confidentiality - Availability
Principle of least privilege
37. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
IPSec
Mandatory vacation
MS-CHAP
Install a network-based IDS
38. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
TCP SYN flood attack
To ensure that staff understands what data they are handling and processing
Platform as a Service
Man-in-the-middle
39. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
Firewall - VPN
The PC has become part of a botnet.
Determine open ports
Footprinting
40. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
User rights and permissions reviews
Block port 23 on the network firewall.
TCP SYN flood attack
Before and after the imaging process and then hash the forensic image
41. Which of the following is an unauthorized wireless router that allows access to a secure network?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Rogue access point
TLS
Protocol analyzer
42. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
ARP poisoning
User rights
signing of a user agreement.
ICMP
43. Which of the following is the primary difference between a virus and a worm?
A worm is self-replicating
Only the message data is encrypted
Initial vector
Availability
44. Which of the following is true concerning email message encryption by using S/MIME?
DoS
Only the message data is encrypted
Smurf attack
Buffer overflow
45. Which of the following are the default ports for HTTP and HTTPS protocols?
Virtual servers have the same information security requirements as physical servers.
Asymmetric and Hashing
Business impact analysis
80 - 443
46. Which of the following manages peer authentication and key exchange for an IPSec connection?
Dumpster diving - Shoulder surfing
Lets you minimize the attack surface relating to the application
IKE
Evil twin
47. Which of the following is MOST commonly a part of routine system audits?
Spam filters
IPv6
User rights and permissions reviews
Cross-site scripting
48. Which of the following is NOT an application layer security protocol?
Initial vector
IPSec
Hot and cold aisles
SNMP (also use to monitor the parameters of network devices)
49. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
Rogue access point
SSL
Vulnerability scanning
Determine open ports
50. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
Vulnerability scanner
Block port 23 on the network firewall.
DMZ
Risk assessmentproduct Answer: D