SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is MOST likely to be the last rule contained on any firewall?
Implicit deny
IPSec
Judgment
Social Engineering attack
2. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Least privilege
Organize data based on severity and asset value.
Separation of duties
ARP poisoning
3. Which of the following is an unauthorized wireless router that allows access to a secure network?
Off-site backup
DNS spoofing
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Rogue access point
4. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
DAC
TPM
Gas
Blind FTP
5. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
TLS
Least privilege
Use SSH to connect to the Linux shell
Data Encryption Standard (DES)
6. Which of the following is MOST relevant to a buffer overflow attack?
NOOP instructions
Off-site backup
ACLs
Cross-site scripting
7. Which of the following identifies some of the running services on a system?
WPA Enterprise
Determine open ports
To ensure that staff understands what data they are handling and processing
It is used to provide data encryption for WAP connections.
8. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Account disablement
Business impact analysis
Enact a policy banning users from bringing in personal music devices.
Configure the IE popup blockers
9. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
VLAN segregation
WPA2-PSK
Rogue access points
Implicit deny
10. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
80 - 443
Network Access Control
MS-CHAP
IPSec
11. Which of the following is true concerning email message encryption by using S/MIME?
Only the message data is encrypted
MAC
BIOS
Hot and cold aisles
12. What asymmetric key is used to decrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
13. Which of the following describes when forensic hashing should occur on a drive?
Baseline reporting
Availability
Organize data based on severity and asset value.
Before and after the imaging process and then hash the forensic image
14. Which of the following is a technique designed to obtain information from a specific person?
Spear phishing
IKE
Platform as a Service
Disable unused ports
15. Which of the following facilitates computing for heavily utilized systems and networks?
Provider cloud
Virtual servers have the same information security requirements as physical servers.
System A fails open. System B fails closed.
Hardware RAID 5 - Software RAID 1
16. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Pharming - Logic bomb
Mantrap
NIDS
Symmetric Key
17. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
IKE
The development team is transferring data to test systems using SFTP and SCP.
Buffer overflow
By masking the IP address of internal computers from the Internet
18. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
22
Rogue access points
Block port 23 on the network firewall.
25
19. Performing routine security audits is a form of which of the following controls?
Determine open ports
To ensure that staff understands what data they are handling and processing
Detective
User rights and permissions reviews
20. Which of the following is a security control that is lost when using cloud computing?
Evil twin
Physical control of the data
The web site's private key.
Only the message data is encrypted
21. Used in conjunction which of the following are PII?
DAC
IPSec
Birthday - Full name
Mandated security configurations have been made to the operating system.
22. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Provider cloud
Logic Bomb
Data Encryption Standard (DES)
80 - 443
23. Which environmental control is part of TEMPEST compliance?
Buffer overflow
Shielding
ACLs
Information disclosure
24. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi
Disable unused services - Update HIPS signatures
It is used to provide data encryption for WAP connections.
25
Principle of least privilege
25. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Vulnerability scanning
IPSec
Vulnerability scan
Disable unused services - Update HIPS signatures
26. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
Change Management System
Loop protection
War driving
Deny all
27. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
HSM
Disable unused services - Update HIPS signatures
Video surveillance
NIPS is blocking activities from those specific websites.
28. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
TPM
Hot and cold aisles
Multi-factor authentication.
Determine open ports
29. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
Proxies
Social Engineering attack
53
Platform as a Service
30. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
Lets you minimize the attack surface relating to the application
White box
53
The new access point was mis-configured and is interfering with another nearby access point.
31. Which of the following is another name for a malicious attacker?
Botnet
Virtual servers have the same information security requirements as physical servers.
FTPS
Black hat
32. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?
Footprinting
Phishing techniques
Change Management System
CAC
33. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
DMZ
Dumpster diving - Shoulder surfing
Visibility - Accessibility - Neighborhood crime rate
HSM
34. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
NIDS
Privilege escalation
To ensure that staff understands what data they are handling and processing
Risk assessmentproduct Answer: D
35. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. Which of the following is NOT an application layer security protocol?
IPSec
Hot and cold aisles
25
Cross-site scripting
37. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
Shoulder surfing
User rights and permissions reviews
Software as a Service
AC filtering - Disabled SSID broadcast
38. Separating of duties is valuable in deterring?
Implicit deny
Dumpster diving - Shoulder surfing
Principle of least privilege
Fraud
39. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Implement a change management strategy
Mandatory vacation
NOOP instructions
Pharming - Logic bomb
40. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Vishing
TCP SYN flood attack
Confidentiality - Availability
The web site's public key.
41. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Use SSH to connect to the Linux shell
Buffer overflow
Trojans
Protocol analyzer
42. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Steganography
Bluesnarfing
Dumpster diving - Shoulder surfing
WPA Enterprise
43. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
IPSec
Dumpster diving - Shoulder surfing
Symmetric
Virtual servers have the same information security requirements as physical servers.
44. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
WPA Enterprise
Diffie-Hellman
Power levels
Mantrap
45. Which of the following would need to be configured correctly to allow remote access to the network?
Cognitive passwords
NIDS
AES and TKIP
ACLs
46. A company that purchases insurance to reduce risk is an example of which of the following?
Risk transference
quantitative risk assessment
Mantraps
Humidity
47. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Algorithm
WPA Enterprise
Fiber optic
MAC filtering
48. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
SSH
Integrity
Load balancer
Buffer overflow
49. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?
Account disablement
DMZ
Loop protection
Cross-site scripting
50. What are typical elements of authentication as part of physical access controls?
Integrity and Authentication
content inspection.
ACLs
ID badges