SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
Whaling
Having the offsite location of tapes also be the hot siteservers
Baseline reporting
Forward to different RDP listening ports.
2. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Asymmetric and Hashing
MAC address
Blind FTP
Risk transference
3. Which of the following describes a passive attempt to identify weaknesses?
EMI shielding
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
To minimize the organizational risk posed by users
Vulnerability scanning
4. Which of the following is the BEST choice for encryption on a wireless network?
NOOP instructions
Asset value
25
WPA2-PSK
5. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
Ensure a proper chain of custody
MAC address
Account disablement
Information disclosure
6. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
VLAN segregation
Cognitive passwords
Software as a Service
Bluesnarfing
7. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
mitigation - acceptance - transference
The remote router has ICMP blocked.
CCTV
Visibility - Accessibility - Neighborhood crime rate
8. Which of the following is used when performing a qualitative risk analysis?
Smurf attack
Birthday - Full name
Judgment
80 - 443
9. What key is used to encrypt an HTTPS session?
Load balancer
Asymmetric and Hashing
Smurf attack
Symmetric
10. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
Buffer overflow
TLS
Mandatory vacation
Information disclosure
11. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
Pharming - Logic bomb
Footprinting
MS-CHAP
The development team is transferring data to test systems using SFTP and SCP.
13. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
Before and after the imaging process and then hash the forensic image
IDS
Firewall rulesflow of network traffic at the edge of the network
DAC
14. Which of the following are accomplished when a message is digitally signed?
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Integrity and Authentication
Humidity
Software as a Service (SaaS)
15. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
CCTV
Vulnerability scanner
Install a network-based IDS
User rights
16. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
Hot and cold aisles
DNS spoofing
TCP SYN flood attack
SSH
17. Which of the following manages peer authentication and key exchange for an IPSec connection?
TCP SYN flood attack
IKE
ICMP
Pharming - Logic bomb
18. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
IKE
Mandatory vacations
se file servers attached to an NAS system.
Detective
19. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Loop protection
Protocol analyzer
Run the image through SHA256. Answer: D
Vishing
20. Which of the following functions is MOST likely performed by a web security gateway?
To provide documentation as to who has handled the evidence
Content filtering
Disable unused services - Update HIPS signatures
Determine open ports
21. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces
Install a network-based IDS
Humidity
S/MIME PGP
SNMP (also use to monitor the parameters of network devices)
22. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
War driving
Change Management System
IKE
Buffer overflow
23. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
Least privilege
Determine the potential monetary costs related to a threat
Run the image through SHA256. Answer: D
Software as a Service (SaaS)
24. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
MAC
FTPS
IPSec
Validate input to remove hypertext
25. On-going annual awareness security training should be coupled with:..
DMZ
Judgment
Implicit deny
signing of a user agreement.
26. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
MD5
Protocol analyzer
Pharming - Logic bomb
HSM
27. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
Physical control of the data
Privacy policy
Dumpster diving - Shoulder surfing
VPN concentrator
28. What asymmetric key is used to decrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. Which of the following is true concerning email message encryption by using S/MIME?
Only the message data is encrypted
Chain of custody
Video surveillance
Clean desk policy
30. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Having the offsite location of tapes also be the hot siteservers
Vulnerability scan
NIPS is blocking activities from those specific websites.
Implicit deny
31. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
Buffer overflow
Risk assessmentproduct Answer: D
Check if relaying is denied for unauthorized domains
Confidentiality
32. Which of the following would need to be configured correctly to allow remote access to the network?
Mandatory vacation
Vulnerability scanning
ACLs
Vulnerability scan
33. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
CCTV
MAC filtering
Fraud
Whaling
34. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
NIPS is blocking activities from those specific websites.
Birthday - Full name
MAC address
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
35. Which of the following describes when forensic hashing should occur on a drive?
Block port 23 on the network firewall.
Run the image through SHA256. Answer: D
To ensure that staff understands what data they are handling and processing
Before and after the imaging process and then hash the forensic image
36. Which of the following port numbers is used for SCP by default?
Dumpster diving - Shoulder surfing
Visibility - Accessibility - Neighborhood crime rate
22
Shoulder surfing
37. Which of the following is a reason to perform user awareness and training?
Hardware RAID 5 - Software RAID 1
Accountability
Firewall rulesflow of network traffic at the edge of the network
To minimize the organizational risk posed by users
38. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Baseline reporting
The development team is transferring data to test systems using SFTP and SCP.
Privacy policy
Rootkit
39. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. Which of the following attacks would password masking help mitigate?
1433
Whaling
ACLs
Shoulder surfing
41. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Fault tolerance
Power levels
Diffie-Hellman
42. A company that purchases insurance to reduce risk is an example of which of the following?
Risk transference
Having the offsite location of tapes also be the hot siteservers
IPv6
Blind FTP
43. Which of the following concepts ensures that the data is only viewable to authorized users?
Change Management System
Buffer overflow
IKE
Confidentiality
44. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
quantitative risk assessment
The remote router has ICMP blocked.
Cognitive passwords
MD5
45. In which of the following locations would a forensic analyst look to find a hooked process?
ID badges
BIOS
Information disclosure
SSH
46. Which of the following is true regarding the WTLS protocol?
It is used to provide data encryption for WAP connections.
Mandatory vacation
Polymorphic
SSH
47. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
The PC has become part of a botnet.
IKE
53
Firewall - VPN
48. Which of the following is used for exchanging secret keys over an insecure public network?
Decrease the power levels on the WAP
Confidentiality - Availability
Implicit deny
Diffie-Hellman
49. Which of the following should NOT be used with username/password authentication?
Phishing techniques
Load balancer
Cognitive passwords
User rights
50. Which of the following is specific to a buffer overflow attack?
Symmetric
escalation of privileges.
Initial vector
Spear phishing