SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is a method to prevent ad-hoc configuration mistakes?
S/MIME PGP
MAC
To provide documentation as to who has handled the evidence
Implement a change management strategy
2. Which of the following is the BEST choice for encryption on a wireless network?
Platform as a Service
25
WPA2-PSK
The remote router has ICMP blocked.
3. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Asset value
Baseline reporting
Diffie-Hellman
4. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
Segmentation of each wireless user from other wireless users
DoS
Initial vector
IPSec
5. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Mantraps
ICMP
1433
System A fails open. System B fails closed.
6. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
DAC
The remote router has ICMP blocked.
S/MIME PGP
Logic Bomb
7. Which of the following is a detective security control?
CCTV
Cognitive passwords
Asymmetric and Hashing
Implicit deny
8. Which of the following will provide the HIGHEST level of wireless network security?
Accountability
AC filtering - Disabled SSID broadcast
WPA2
Footprinting
9. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
Determine the potential monetary costs related to a threat
Configure the IE popup blockers
NIPS is blocking activities from those specific websites.
Symmetric
10. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
Protocol analyzer
Integrity
Risk assessmentproduct Answer: D
Security guard - Proximity reader
11. Which of the following is another name for a malicious attacker?
Black hat
NIDS
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
escalation of privileges.
12. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
Initial vector
Spam filters
VPN concentrator
Man-in-the-middle
13. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
DoS
Vulnerability scanning
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Baseline reporting
14. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
Rogue access points
se file servers attached to an NAS system.
User rights
Only the message data is encrypted
15. Which of the following is the BEST way to secure data for the purpose of retention?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Off-site backup
Multi-factor authentication.
Logic Bomb
16. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Spam filters
Pharming - Logic bomb
Diffie-Hellman
The server is missing the default gateway.
18. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Protocol analyzer
Integrity and Authentication
War driving
The PC has become part of a botnet.
19. Which of the following is used when performing a quantitative risk analysis?
Decrease the power levels on the WAP
Blind FTP
Asset value
content inspection.
20. Which of the following is MOST relevant to a buffer overflow attack?
Decrease the power levels on the WAP
VLAN segregation
quantitative risk assessment
NOOP instructions
21. What are typical elements of authentication as part of physical access controls?
ID badges
To provide documentation as to who has handled the evidence
TCP SYN flood attack
Footprinting
22. Which of the following attacks would password masking help mitigate?
Judgment
Diffie-Hellman
Lets you minimize the attack surface relating to the application
Shoulder surfing
23. Which of the following logical controls does a flood guard protect against?
To minimize the organizational risk posed by users
SYN attacks
ACLs
80 - 443
24. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
extremely slow and numerous antivirus alerts
Integrity
WPA2-PSK
Vulnerability scanner
25. In which of the following locations would a forensic analyst look to find a hooked process?
BIOS
Disable unused ports
By masking the IP address of internal computers from the Internet
Provider cloud
26. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
AES and TKIP
Privacy policy
NIPS is blocking activities from those specific websites.
Hardware RAID 5 - Software RAID 1
27. How does a NAT server help protect your network?
Physical control of the data
Baseline reporting
Diffie-Hellman
By masking the IP address of internal computers from the Internet
28. Which of the following would need to be configured correctly to allow remote access to the network?
HSM
80 - 443
se file servers attached to an NAS system.
ACLs
29. Which of the following is an unauthorized wireless router that allows access to a secure network?
Rogue access point
VPN concentrator
Run the image through SHA256. Answer: D
Spear phishing
30. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Visibility - Accessibility - Neighborhood crime rate
To minimize the organizational risk posed by users
Gas
IPSec
31. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
War driving
Mantraps
Vulnerability scanner
Vulnerability scan
32. Which of the following is true regarding the WTLS protocol?
VLAN segregation
A system that stops an attack in progress.
It is used to provide data encryption for WAP connections.
Configure the IE popup blockers
33. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Check if relaying is denied for unauthorized domains
Buffer overflow
Video surveillance
Hot and cold aisles
34. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
A worm is self-replicating
Account disablement
Platform as a Service
35. What allows for all activities on a network or system to be traced to the user who performed them?
extremely slow and numerous antivirus alerts
Provider cloud
Accountability
Symmetric
36. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
MAC
Add input validation to forms.
TCP SYN flood attack
Rogue access points
37. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Vulnerability scan
Firewall rulesflow of network traffic at the edge of the network
Mandatory vacation
Humidity
38. Which of the following should be enabled to ensure only certain wireless clients can access the network?
System A fails open. System B fails closed.
MAC filtering
Protocol analyzer
Buffer overflow
39. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
WPA Enterprise
By masking the IP address of internal computers from the Internet
The server is missing the default gateway.
CAC
40. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Dumpster diving - Shoulder surfing
PEAP-TLS
Buffer overflow
Account disablement
41. Which of the following concepts ensures that the data is only viewable to authorized users?
Confidentiality
CAC
Protocol analyzer
Configure the IE popup blockers
42. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Command injection
The server is missing the default gateway.
S/MIME PGP
BIOS
43. Which of the following facilitates computing for heavily utilized systems and networks?
Confidentiality
Provider cloud
Organize data based on severity and asset value.
MAC address
44. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
SYN attacks
Segmentation of each wireless user from other wireless users
DNS spoofing
22
45. Which of the following allows a security administrator to set device traps?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
SNMP (also use to monitor the parameters of network devices)
Privilege escalation
ACLs
46. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Rootkit
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Buffer overflow
Risk transference
47. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
Buffer overflow
The remote router has ICMP blocked.
Whaling
ARP poisoning
48. Actively monitoring data streams in search of malicious code or behavior is an example of..
Privacy policy
content inspection.
Whaling
AES and TKIP
49. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Only the message data is encrypted
smurf attacks
Symmetric Key
Mandatory vacation
50. What port does the Domain Name Service (DNS) use by default?
53
SSL
Phishing techniques
Data Encryption Standard (DES)