SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
Decrease the power levels on the WAP
Account disablement
Implement a change management strategy
Spam filters
2. Which of the following is the BEST way to secure data for the purpose of retention?
Off-site backup
Protocol analyzer
The remote router has ICMP blocked.
25
3. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
22
Rogue access point
Integrity
Disable unused ports
4. Which of the following is not an asymmetric system?
Dumpster diving - Shoulder surfing
DES
1433
User rights and permissions reviews
5. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
signing of a user agreement.
1433
DNS spoofing
Determine the potential monetary costs related to a threat
6. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. Which of the following is used when performing a quantitative risk analysis?
Run the image through SHA256. Answer: D
Memory - network processes - and system processesserver. If the computer is powered off
Footprinting
Asset value
8. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Footprinting
Protocol analyzer
Birthday - Full name
Rootkit
9. Which of the following BEST describes an intrusion prevention system?
To provide documentation as to who has handled the evidence
Privacy policy
Hardware RAID 5 - Software RAID 1
A system that stops an attack in progress.
10. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
Baseline reporting
The web site's private key.
Business impact analysis
SSL
11. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?
Diffie-Hellman
Validate input to remove hypertext
Vulnerability scanner
Accountability
12. Which of the following are the default ports for HTTP and HTTPS protocols?
53
Separation of duties
80 - 443
Clean desk policy
13. Which of the following logical controls does a flood guard protect against?
A worm is self-replicating
The server is missing the default gateway.
SYN attacks
NIDS
14. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
DAC
User rights and permissions reviews
Proxies
DoS
15. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Dumpster diving - Shoulder surfing
Blind FTP
Gas
16. Which of the following concepts ensures that the data is only viewable to authorized users?
Hardware RAID 5 - Software RAID 1
Buffer overflow
Confidentiality
Power levels
17. A system administrator could have a user level account and an administrator account to prevent:...
Whaling
TPM
Cognitive passwords
escalation of privileges.
18. Which of the following should NOT be used with username/password authentication?
Cognitive passwords
The remote router has ICMP blocked.
Dumpster diving - Shoulder surfing
System A fails open. System B fails closed.
19. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
Determine the potential monetary costs related to a threat
MAC
DNS spoofing
Configure the IE popup blockers
20. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
War driving
Pharming - Logic bomb
Mantrap
White box
21. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
Shoulder surfing
To ensure that staff understands what data they are handling and processing
VPN concentrator
Virtual servers have the same information security requirements as physical servers.
22. Which environmental control is part of TEMPEST compliance?
Determine open ports
Shielding
MAC filtering
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
23. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
To provide documentation as to who has handled the evidence
Buffer overflow
Block port 23 on the network firewall.
Hot and cold aisles
24. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Hardware RAID 5 - Software RAID 1
Shoulder surfing
White box
IDS
25. Which of the following is the BEST choice for encryption on a wireless network?
WPA2-PSK
Implicit deny
mitigation - acceptance - transference
Vulnerability scan
26. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
MAC
Information disclosure
Organize data based on severity and asset value.
Implicit deny
27. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Phishing techniques
25
Privilege escalation
To provide documentation as to who has handled the evidence
28. In which of the following locations would a forensic analyst look to find a hooked process?
BIOS
Evil twin
Cognitive passwords
Black hat
29. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
Birthday - Full name
Rogue access points
se file servers attached to an NAS system.
Vulnerability scan
30. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
War driving
NIPS is blocking activities from those specific websites.
MAC filtering
It is used to provide data encryption for WAP connections.
31. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
Confidentiality - Availability
Whaling
Detective
ACLs
32. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
Physical control of the data
Lets you minimize the attack surface relating to the application
MS-CHAP
Network Access Control
33. Which of the following is a best practice when securing a switch from physical access?
Disable unused ports
Cross-site scripting
ICMP
Tailgating
34. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Vulnerability scan
Only the message data is encrypted
CAC
Vulnerability scanning
35. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Baseline reporting
Clean desk policy
content inspection.
Security guard - Proximity reader
36. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
Smurf attack
TCP SYN flood attack
Spear phishing
Run the image through SHA256. Answer: D
37. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
Hot and cold aisles
Vishing
Off-site backup
Data Encryption Standard (DES)
38. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
TLS
Decrease the power levels on the WAP
Detective
Footprinting
39. MAC filtering is a form of which of the following?
mitigation - acceptance - transference
Integrity and Authentication
Network Access Control
Decrease the power levels on the WAP
40. Which of the following is used when performing a qualitative risk analysis?
Judgment
Protocol analyzer
ID badges
Virtual servers have the same information security requirements as physical servers.
41. For which of the following is centralized key management most complicated?
Least privilege
The user's PC is missing the authentication agent.
Gas
Symmetric Key
42. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
The development team is transferring data to test systems using SFTP and SCP.
Add input validation to forms.
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Principle of least privilege
43. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
User rights and permissions reviews
Vulnerability scanner
Implicit deny
Man-in-the-middle
44. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
content inspection.
War driving
Principle of least privilege
WPA Enterprise
45. Which of the following manages peer authentication and key exchange for an IPSec connection?
Steganography
Tailgating
IKE
Account disablement
46. Which of the following MUST a programmer implement to prevent cross-site scripting?
Detective
Validate input to remove hypertext
A worm is self-replicating
ACLs
47. You are performing risk assessment for an organization. What should you do during impact assessment?
Account disablement
DoS
Dumpster diving
Determine the potential monetary costs related to a threat
48. A company that purchases insurance to reduce risk is an example of which of the following?
Risk transference
Business impact analysis
Social Engineering attack
Location that meets power and connectivity requirementsdatacenter
49. Webmail is classified under which of the following cloud-based technologies?
The new access point was mis-configured and is interfering with another nearby access point.
Software as a Service (SaaS)
Block port 23 on the network firewall.
Clustering
50. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
ACLs
Buffer overflow
Software as a Service
Visibility - Accessibility - Neighborhood crime rate