SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is the BEST choice for encryption on a wireless network?
Blind FTP
WPA2-PSK
TLS
IDEA and TripleDes
2. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
Spear phishing
Implicit deny
DoS
TPM
3. How does a NAT server help protect your network?
Dumpster diving
By masking the IP address of internal computers from the Internet
Clean desk policy
Data Encryption Standard (DES)
4. Which of the following is specific to a buffer overflow attack?
IKE
Network Access Control
Shielding
Initial vector
5. Which of the following would need to be configured correctly to allow remote access to the network?
ACLs
DMZ
Network Access Control
Shoulder surfing
6. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Ensure a proper chain of custody
Forward to different RDP listening ports.
Hot and cold aisles
Privacy policy
7. What types of encryption are used for adding a digital signature to a message?
Asymmetric and Hashing
WPA2
Principle of least privilege
Protocol analyzer
8. The detection of a NOOP sled is an indication of which of the following attacks?
Buffer overflow
Security guard - Proximity reader
DMZ
Decrease the power levels on the WAP
9. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
Fault tolerance
Virtual servers have the same information security requirements as physical servers.
Baseline reporting
Accountability
10. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
MAC
Only the message data is encrypted
Vulnerability scan
Least privilege
11. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Software as a Service
Tailgating
Gas
12. Which of the following port numbers is used for SCP by default?
DES
To ensure that staff understands what data they are handling and processing
22
Decrease the power levels on the WAP
13. Which of the following describes when forensic hashing should occur on a drive?
Man-in-the-middle
Before and after the imaging process and then hash the forensic image
Privacy policy
ACLs
14. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
Hardware RAID 5 - Software RAID 1
A worm is self-replicating
Off-site backup
DAC
15. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Blind FTP
Load balancer
Fault tolerance
Rootkit
16. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
escalation of privileges.
Footprinting
Video surveillance
By masking the IP address of internal computers from the Internet
17. What key is used to encrypt an HTTPS session?
Proxies
Add input validation to forms.
Algorithm
Symmetric
18. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Proxies
Firewall rulesflow of network traffic at the edge of the network
The development team is transferring data to test systems using SFTP and SCP.
Security guard - Proximity reader
19. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
HSM
EMI shielding
S/MIME PGP
Software as a Service
20. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Data Encryption Standard (DES)
Mantrap
User rights
Steganography
21. Which of the following is used when performing a quantitative risk analysis?
WPA Enterprise
IDEA and TripleDes
Asset value
CAC
22. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
MAC
The remote router has ICMP blocked.
NOOP instructions
Multi-factor authentication.
23. On-going annual awareness security training should be coupled with:..
ARP poisoning
signing of a user agreement.
Vulnerability scanning
NIDS
24. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?
Command injection
Platform as a Service
Bluesnarfing
Cognitive passwords
25. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
Information disclosure
User rights
Command injection
Rogue access points
26. Which of the following reduces the likelihood of a single point of failure when a server fails?
80 - 443
VPN concentrator
Clustering
Shielding
27. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
The development team is transferring data to test systems using SFTP and SCP.
A system that stops an attack in progress.
Install a network-based IDS
Data Encryption Standard (DES)
28. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
Visibility - Accessibility - Neighborhood crime rate
Birthday - Full name
Tailgating
Fraud
29. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Logic Bomb
Implement a change management strategy
Blind FTP
Baseline reporting
30. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
ACLs
Cognitive passwords
TLS
Validate input to remove hypertext
31. Which of the following is a reason to perform user awareness and training?
Ensure a proper chain of custody
Add input validation to forms.
To minimize the organizational risk posed by users
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
32. Which of the following identifies some of the running services on a system?
Firewall - VPN
Determine open ports
Mandated security configurations have been made to the operating system.
mitigation - acceptance - transference
33. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
User rights
Separation of duties
TCP SYN flood attack
extremely slow and numerous antivirus alerts
34. Which of the following is true regarding the WTLS protocol?
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Having the offsite location of tapes also be the hot siteservers
It is used to provide data encryption for WAP connections.
DES
35. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Add input validation to forms.
SSH
Organize data based on severity and asset value.
Mantraps
36. In which of the following locations would a forensic analyst look to find a hooked process?
Clean desk policy
1433
Polymorphic
BIOS
37. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
Virtual servers have the same information security requirements as physical servers.
Firewall rulesflow of network traffic at the edge of the network
IDS
Evil twin
38. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m
TLS
Black hat
Diffie-Hellman
The new access point was mis-configured and is interfering with another nearby access point.
39. Risk can be managed in the following ways...
Vulnerability scan
mitigation - acceptance - transference
ARP poisoning
TLS
40. Which of the following are accomplished when a message is digitally signed?
Loop protection
System A fails open. System B fails closed.
Integrity and Authentication
Asymmetric and Hashing
41. Which of the following BEST describes the proper method and reason to implement port security?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Configure the IE popup blockers
53
Phishing techniques
42. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
Diffie-Hellman
Change Management System
Check if relaying is denied for unauthorized domains
MAC
43. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
IPv6
Memory - network processes - and system processesserver. If the computer is powered off
Principle of least privilege
MAC filtering
44. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
ACLs
Mandated security configurations have been made to the operating system.
Cognitive passwords
VPN concentrator
45. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Cross-site scripting
Physical control of the data
Spear phishing
The development team is transferring data to test systems using SFTP and SCP.
46. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Buffer overflow
Off-site backup
The development team is transferring data to test systems using SFTP and SCP.
Pharming - Logic bomb
47. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Content filtering
The new access point was mis-configured and is interfering with another nearby access point.
Command injection
Dumpster diving
48. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Organize data based on severity and asset value.
Business impact analysis
Firewall rulesflow of network traffic at the edge of the network
ICMP
49. Which of the following BEST describes an intrusion prevention system?
Whaling
Implicit deny
Vulnerability scanning
A system that stops an attack in progress.
50. A system administrator could have a user level account and an administrator account to prevent:...
Tailgating
The web site's public key.
Birthday - Full name
escalation of privileges.