SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?
Fiber optic
Cross-site scripting
IDS
Location that meets power and connectivity requirementsdatacenter
2. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
IPv6
DMZ
Privacy policy
Blind FTP
3. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?
22
Disable unused services - Update HIPS signatures
Phishing techniques
Determine the potential monetary costs related to a threat
4. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
Visibility - Accessibility - Neighborhood crime rate
Software as a Service (SaaS)
se file servers attached to an NAS system.
Vulnerability scanning
5. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
The web site's private key.
Use SSH to connect to the Linux shell
ID badges
Run the image through SHA256. Answer: D
6. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
Data Encryption Standard (DES)
Initial vector
Mantrap
Only the message data is encrypted
7. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
Man-in-the-middle
Use SSH to connect to the Linux shell
Business impact analysis
Implicit deny
8. A system administrator could have a user level account and an administrator account to prevent:...
escalation of privileges.
By masking the IP address of internal computers from the Internet
Implicit deny
Lets you minimize the attack surface relating to the application
9. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
Check if relaying is denied for unauthorized domains
Memory - network processes - and system processesserver. If the computer is powered off
Cognitive passwords
The development team is transferring data to test systems using SFTP and SCP.
10. Which of the following functions is MOST likely performed by a web security gateway?
Symmetric
The new access point was mis-configured and is interfering with another nearby access point.
Content filtering
WPA2-PSK
11. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
Principle of least privilege
Use SSH to connect to the Linux shell
A system that stops an attack in progress.
DoS
12. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
By masking the IP address of internal computers from the Internet
MAC
MS-CHAP
Birthday - Full name
13. What is the advantage of using application virtualization?
53
Install a network-based IDS
Lets you minimize the attack surface relating to the application
Privilege escalation
14. Used in conjunction which of the following are PII?
ICMP
Birthday - Full name
Protocol analyzer
Proxies
15. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Social Engineering attack
ARP poisoning
Dumpster diving
Buffer overflow
16. Which of the following devices would allow a technician to view IP headers on a data packet?
Protocol analyzer
Rogue access point
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
escalation of privileges.
17. Which of the following is the BEST choice for encryption on a wireless network?
22
Privacy policy
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
WPA2-PSK
18. Which of the following describes when forensic hashing should occur on a drive?
Account disablement
Before and after the imaging process and then hash the forensic image
Network Access Control
25
19. Risk can be managed in the following ways...
Disable unused ports
AES and TKIP
mitigation - acceptance - transference
WPA2-PSK
20. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
To ensure that staff understands what data they are handling and processing
Cross-site scripting
User rights and permissions reviews
Principle of least privilege
21. Which of the following is not an asymmetric system?
DES
HSM
Principle of least privilege
MAC filtering
22. Webmail is classified under which of the following cloud-based technologies?
escalation of privileges.
It is used to provide data encryption for WAP connections.
Software as a Service (SaaS)
Evil twin
23. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Hardware RAID 5 - Software RAID 1
Evil twin
22
Organize data based on severity and asset value.
24. What are typical elements of authentication as part of physical access controls?
Lets you minimize the attack surface relating to the application
ID badges
Rogue access points
Protocol analyzer
25. Which of the following is used for exchanging secret keys over an insecure public network?
Account disablement
Botnet
Mantraps
Diffie-Hellman
26. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
NIPS is blocking activities from those specific websites.
Social Engineering attack
25
Dumpster diving - Shoulder surfing
27. Which of the following are accomplished when a message is digitally signed?
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Mandated security configurations have been made to the operating system.
User rights and permissions reviews
Integrity and Authentication
28. Which of the following describes a passive attempt to identify weaknesses?
Detective
Footprinting
Mandated security configurations have been made to the operating system.
Vulnerability scanning
29. Which of the following manages peer authentication and key exchange for an IPSec connection?
CAC
Implement a change management strategy
The web site's public key.
IKE
30. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
MD5
content inspection.
S/MIME PGP
31. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
Rootkit
Rogue access points
Confidentiality
IDS
32. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
VPN concentrator
The remote router has ICMP blocked.
Bluesnarfing
Trojans
33. Which of the following should be enabled to ensure only certain wireless clients can access the network?
MAC filtering
HSM
Initial vector
EMI shielding
34. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Mantrap
Spear phishing
MAC address
TCP SYN flood attack
35. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?
White box
Loop protection
A worm is self-replicating
MAC
36. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
Clean desk policy
ARP poisoning
System A fails open. System B fails closed.
Mandated security configurations have been made to the operating system.
37. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
extremely slow and numerous antivirus alerts
DMZ
Initial vector
Algorithm
38. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
Mantraps
Birthday - Full name
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Deny all
39. Which of the following is NOT an application layer security protocol?
Vulnerability scanning
Multi-factor authentication.
IPSec
Mandatory vacation
40. Which solution should you use?
A system that stops an attack in progress.
ID badges
Cross-site scripting
se file servers attached to an NAS system.
41. MAC filtering is a form of which of the following?
Tailgating
Network Access Control
Cognitive passwords
VPN concentrator
42. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces
Install a network-based IDS
Diffie-Hellman
AC filtering - Disabled SSID broadcast
Steganography
43. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
User rights
Integrity
Run the image through SHA256. Answer: D
Implement a change management strategy
44. The detection of a NOOP sled is an indication of which of the following attacks?
Buffer overflow
Dumpster diving - Shoulder surfing
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
NIPS is blocking activities from those specific websites.
45. Which of the following is the default rule found in a corporate firewall's access control list?
MAC
ID badges
Deny all
mitigation - acceptance - transference
46. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
ACLs
VPN concentrator
DMZ
Forward to different RDP listening ports.
47. Which of the following is MOST commonly a part of routine system audits?
Buffer overflow
Logic Bomb
The web site's private key.
User rights and permissions reviews
48. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
NOOP instructions
80 - 443
Polymorphic
WPA2-PSK
49. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Gas
Implicit deny
War driving
Command injection
50. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
IPv6
Forward to different RDP listening ports.
DoS
SSL
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests