SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
Business impact analysis
Privacy policy
Add input validation to forms.
DMZ
2. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
The server is missing the default gateway.
Initial vector
Information disclosure
Disable unused services - Update HIPS signatures
3. Which of the following should be installed to prevent employees from receiving unsolicited emails?
Spam filters
Implicit deny
Block port 23 on the network firewall.
Man-in-the-middle
4. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Dumpster diving - Shoulder surfing
Location that meets power and connectivity requirementsdatacenter
Only the message data is encrypted
Rootkit
5. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi
System A fails open. System B fails closed.
Gas
ARP poisoning
Principle of least privilege
6. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
Implement a change management strategy
AC filtering - Disabled SSID broadcast
Segmentation of each wireless user from other wireless users
Business impact analysis
7. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
To provide documentation as to who has handled the evidence
DMZ
Only the message data is encrypted
Baseline reporting
8. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
DAC
ID badges
FTPS
1433
9. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
Asymmetric and Hashing
Location that meets power and connectivity requirementsdatacenter
Provider cloud
Whaling
10. Which of the following would need to be configured correctly to allow remote access to the network?
ACLs
Block port 23 on the network firewall.
Asymmetric and Hashing
Accountability
11. With which of the following is RAID MOST concerned?
Determine the potential monetary costs related to a threat
Validate input to remove hypertext
53
Availability
12. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
Configure the IE popup blockers
BIOS
Smurf attack
Before and after the imaging process and then hash the forensic image
13. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
escalation of privileges.
Trojans
Initial vector
53
14. What are typical elements of authentication as part of physical access controls?
Segmentation of each wireless user from other wireless users
Implement a change management strategy
The server is missing the default gateway.
ID badges
15. On-going annual awareness security training should be coupled with:..
Cross-site scripting
User rights and permissions reviews
TLS
signing of a user agreement.
16. Which of the following is another name for a malicious attacker?
SSL
Black hat
Bluesnarfing
Video surveillance
17. Upper management decides which risk to mitigate based on cost. This is an example of:
Run the image through SHA256. Answer: D
WPA Enterprise
quantitative risk assessment
Network Access Control
18. Webmail is classified under which of the following cloud-based technologies?
A worm is self-replicating
DAC
White box
Software as a Service (SaaS)
19. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
Add input validation to forms.
User rights and permissions reviews
DMZ
TPM
20. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
IKE
Birthday - Full name
Configure the IE popup blockers
Protocol analyzer
21. Which of the following is used for exchanging secret keys over an insecure public network?
Diffie-Hellman
Command injection
Load balancer
Rogue access points
22. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
Asymmetric and Hashing
MAC address
User rights and permissions reviews
Physical control of the data
23. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
Rogue access points
Change Management System
SSL
Detective
24. What key is used to encrypt an HTTPS session?
Vulnerability scanning
Symmetric
Power levels
NOOP instructions
25. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
Only the message data is encrypted
Hardware RAID 5 - Software RAID 1
The remote router has ICMP blocked.
Information disclosure
26. Which of the following encryption algorithms can be used in PGP for data encryption?
Principle of least privilege
Protocol analyzer
Smurf attack
IDEA and TripleDes
27. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Video surveillance
BIOS
Mandatory vacation
Logic Bomb
28. Which environmental control is part of TEMPEST compliance?
Shielding
Implicit deny
Social Engineering attack
Protocol analyzer
29. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
Virtual servers have the same information security requirements as physical servers.
Deny all
Vulnerability scan
Enact a policy banning users from bringing in personal music devices.
30. How does a NAT server help protect your network?
80 - 443
Command injection
By masking the IP address of internal computers from the Internet
Rootkit
31. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Block port 23 on the network firewall.
22
Determine open ports
Detective
32. Which solution should you use?
Physical control of the data
se file servers attached to an NAS system.
ID badges
Cross-site scripting
33. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
Platform as a Service
Data Encryption Standard (DES)
Spear phishing
MAC
34. Which of the following is not an asymmetric system?
War driving
VPN concentrator
DES
The PC has become part of a botnet.
35. Which of the following is a management control type?
escalation of privileges.
80 - 443
Fiber optic
Vulnerability scanning
36. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces
Implicit deny
Integrity
Install a network-based IDS
Vulnerability scan
38. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
Mandated security configurations have been made to the operating system.
SSH
Vulnerability scanning
System A fails open. System B fails closed.
39. Which of the following are the default ports for HTTP and HTTPS protocols?
White box
80 - 443
By masking the IP address of internal computers from the Internet
Rootkit
40. MAC filtering is a form of which of the following?
Change Management System
Separation of duties
Network Access Control
The remote router has ICMP blocked.
41. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
Polymorphic
Phishing techniques
Disable unused services - Update HIPS signatures
VLAN segregation
42. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
Black hat
signing of a user agreement.
Spear phishing
Vishing
43. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
Confidentiality - Availability
War driving
Cross-site scripting
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
44. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?
Virtual servers have the same information security requirements as physical servers.
Dumpster diving
The new access point was mis-configured and is interfering with another nearby access point.
Fault tolerance
45. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
Spear phishing
Mandated security configurations have been made to the operating system.
Botnet
Disable unused services - Update HIPS signatures
46. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
Steganography
Confidentiality - Availability
TPM
War driving
47. Which of the following BEST describes an intrusion prevention system?
Trojans
Dumpster diving
A system that stops an attack in progress.
Asset value
48. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
Security guard - Proximity reader
Risk transference
WPA2
SSL
49. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
Confidentiality - Availability
TLS
SSH
The PC has become part of a botnet.
50. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
IDS
Forward to different RDP listening ports.
DoS
Check if relaying is denied for unauthorized domains