SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following should be installed to prevent employees from receiving unsolicited emails?
Spam filters
Determine open ports
Integrity and Authentication
SYN attacks
2. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
Vishing
Rogue access points
Whaling
MAC filtering
3. Which of the following is MOST commonly a part of routine system audits?
User rights and permissions reviews
Privacy policy
NIPS is blocking activities from those specific websites.
Asymmetric and Hashing
4. What are typical elements of authentication as part of physical access controls?
War driving
ID badges
Judgment
Fiber optic
5. On-going annual awareness security training should be coupled with:..
signing of a user agreement.
80 - 443
Cross-site scripting
Dumpster diving - Shoulder surfing
6. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
Hot and cold aisles
MAC
DNS spoofing
Cognitive passwords
7. For which of the following is centralized key management most complicated?
Initial vector
Symmetric Key
Shielding
Evil twin
8. Which of the following is true concerning email message encryption by using S/MIME?
Only the message data is encrypted
The development team is transferring data to test systems using SFTP and SCP.
Social Engineering attack
Chain of custody
9. Which of the following uses TCP port 22 by default?
WPA Enterprise
Spam filters
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Vulnerability scan
10. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
Baseline reporting
VLAN segregation
SYN attacks
extremely slow and numerous antivirus alerts
11. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
Dumpster diving
Platform as a Service
Bluesnarfing
Disable unused services - Update HIPS signatures
12. What asymmetric key is used to decrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
13. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
Tailgating
Decrease the power levels on the WAP
Hardware RAID 5 - Software RAID 1
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
14. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?
Network Access Control
Fiber optic
Mandatory vacations
Firewall rulesflow of network traffic at the edge of the network
15. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
To provide documentation as to who has handled the evidence
SSH
Deny all
CAC
16. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Business impact analysis
Virtual servers have the same information security requirements as physical servers.
smurf attacks
Enact a policy banning users from bringing in personal music devices.
17. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m
The new access point was mis-configured and is interfering with another nearby access point.
Trojans
ACLs
DMZ
18. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Cognitive passwords
Memory - network processes - and system processesserver. If the computer is powered off
Confidentiality - Availability
To provide documentation as to who has handled the evidence
19. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Buffer overflow
Diffie-Hellman
Decrease the power levels on the WAP
20. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Confidentiality
Accountability
Blind FTP
Footprinting
21. Which of the following BEST describes the proper method and reason to implement port security?
WPA Enterprise
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Principle of least privilege
FTPS
22. Which of the following is the MAIN reason to require data labeling?
MAC address
Implement a change management strategy
se file servers attached to an NAS system.
To ensure that staff understands what data they are handling and processing
23. Which of the following identifies some of the running services on a system?
Gas
WPA Enterprise
Change Management System
Determine open ports
24. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
Judgment
Buffer overflow
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
S/MIME PGP
25. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Physical control of the data
Pharming - Logic bomb
The server is missing the default gateway.
IPv6
26. Risk can be managed in the following ways...
Social Engineering attack
WPA2
mitigation - acceptance - transference
IKE
27. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
Smurf attack
MAC
Least privilege
SSL
28. How does a NAT server help protect your network?
Steganography
The PC has become part of a botnet.
By masking the IP address of internal computers from the Internet
Location that meets power and connectivity requirementsdatacenter
29. Which of the following devices is often used to cache and filter content?
Proxies
MS-CHAP
Whaling
MAC filtering
30. Which of the following is true regarding the WTLS protocol?
Ensure a proper chain of custody
AES and TKIP
Humidity
It is used to provide data encryption for WAP connections.
31. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Dumpster diving - Shoulder surfing
SSL
Botnet
Symmetric
32. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Asymmetric and Hashing
Steganography
25
User rights
33. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
SSH
Clean desk policy
Algorithm
Vishing
34. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
Spear phishing
80 - 443
ARP poisoning
Least privilege
35. You are performing risk assessment for an organization. What should you do during impact assessment?
Proxies
Provider cloud
Clean desk policy
Determine the potential monetary costs related to a threat
36. In which of the following locations would a forensic analyst look to find a hooked process?
BIOS
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Off-site backup
Proxies
37. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
Pharming - Logic bomb
Visibility - Accessibility - Neighborhood crime rate
CAC
Check if relaying is denied for unauthorized domains
38. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Business impact analysis
Baseline reporting
Accountability
Logic Bomb
39. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
Vishing
Decrease the power levels on the WAP
Principle of least privilege
MAC address
40. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
Mantraps
Vishing
Load balancer
Availability
41. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
mitigation - acceptance - transference
DNS spoofing
Hot and cold aisles
Firewall rulesflow of network traffic at the edge of the network
42. Which of the following includes a photo and can be used for identification?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Bluesnarfing
CAC
43. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
VLAN
DMZ
TPM
S/MIME PGP
44. Which of the following protocols requires the use of a CA based authentication process?
Privilege escalation
Hot and cold aisles
PEAP-TLS
CAC
45. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
MAC
The server is missing the default gateway.
Asymmetric and Hashing
Virtual servers have the same information security requirements as physical servers.
46. Which of the following encryption algorithms can be used in PGP for data encryption?
Principle of least privilege
IDEA and TripleDes
WPA2
Phishing techniques
47. Which of the following is the default rule found in a corporate firewall's access control list?
TPM
Decrease the power levels on the WAP
Deny all
Validate input to remove hypertext
48. Which of the following is the primary difference between a virus and a worm?
A worm is self-replicating
Botnet
Spear phishing
Buffer overflow
49. Which of the following is the MOST secure method of utilizing FTP?
Determine the potential monetary costs related to a threat
Baseline reporting
War driving
FTPS
50. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
War driving
smurf attacks
TLS
Confidentiality