SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The detection of a NOOP sled is an indication of which of the following attacks?
Multi-factor authentication.
Chain of custody
Buffer overflow
Spam filters
2. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
Footprinting
DMZ
Memory - network processes - and system processesserver. If the computer is powered off
Clustering
3. Actively monitoring data streams in search of malicious code or behavior is an example of..
Phishing techniques
content inspection.
Mantrap
Network Access Control
4. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
TPM
Rogue access points
A worm is self-replicating
5. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
TLS
MD5
mitigation - acceptance - transference
ACLs
6. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Content filtering
Security guard - Proximity reader
IDS
Privilege escalation
7. Which of the following attacks would password masking help mitigate?
To minimize the organizational risk posed by users
Proxies
Shoulder surfing
Visibility - Accessibility - Neighborhood crime rate
8. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
Buffer overflow
Principle of least privilege
Logic Bomb
extremely slow and numerous antivirus alerts
9. Which of the following would need to be configured correctly to allow remote access to the network?
ACLs
To ensure that staff understands what data they are handling and processing
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
IPv6
10. Which of the following is the BEST choice for encryption on a wireless network?
WPA2-PSK
War driving
Privilege escalation
Disable unused services - Update HIPS signatures
11. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Cross-site scripting
25
Mandatory vacations
Spear phishing
12. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
Cognitive passwords
NIDS
Network Access Control
ACLs
13. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
content inspection.
Determine open ports
Ensure a proper chain of custody
Software as a Service
14. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?
Decrease the power levels on the WAP
80 - 443
Asset value
ARP poisoning
15. Which of the following logical controls does a flood guard protect against?
The remote router has ICMP blocked.
Load balancer
Visibility - Accessibility - Neighborhood crime rate
SYN attacks
16. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
Information disclosure
Block port 23 on the network firewall.
MAC address
NIDS
17. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Steganography
By masking the IP address of internal computers from the Internet
AC filtering - Disabled SSID broadcast
Load balancer
18. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
DoS
Accountability
Configure the IE popup blockers
War driving
19. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Footprinting
Steganography
Spear phishing
Implement a change management strategy
20. Which of the following protocols requires the use of a CA based authentication process?
VLAN segregation
To ensure that staff understands what data they are handling and processing
PEAP-TLS
Evil twin
21. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Vulnerability scanner
Use SSH to connect to the Linux shell
Cognitive passwords
Algorithm
22. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Baseline reporting
Birthday - Full name
VLAN segregation
System A fails open. System B fails closed.
23. Which of the following encryption algorithms can be used in PGP for data encryption?
Chain of custody
Rogue access points
MD5
IDEA and TripleDes
24. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Spear phishing
Clean desk policy
Hardware RAID 5 - Software RAID 1
MAC
25. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Spear phishing
80 - 443
IPSec
Asymmetric and Hashing
26. Which of the following is a detective security control?
Software as a Service (SaaS)
CCTV
Lets you minimize the attack surface relating to the application
Initial vector
27. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Risk assessmentproduct Answer: D
Integrity
WPA Enterprise
Vulnerability scan
28. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
Blind FTP
Command injection
Lets you minimize the attack surface relating to the application
Evil twin
30. Which of the following should NOT be used with username/password authentication?
Cognitive passwords
Only the message data is encrypted
Judgment
Separation of duties
31. Which of the following is a security control that is lost when using cloud computing?
Load balancer
WPA2-PSK
Rogue access point
Physical control of the data
32. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Least privilege
WPA Enterprise
CAC
Pharming - Logic bomb
33. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
Evil twin
Availability
Bluesnarfing
Run the image through SHA256. Answer: D
34. Which of the following allows a security administrator to set device traps?
Memory - network processes - and system processesserver. If the computer is powered off
Business impact analysis
SNMP (also use to monitor the parameters of network devices)
Fiber optic
35. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
Mantraps
Firewall - VPN
Protocol analyzer
IPv6
36. Which of the following uses TCP port 22 by default?
Platform as a Service
VLAN segregation
Steganography
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
37. Which of the following environmental variables reduces the potential for static discharges?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Spam filters
FTPS
Humidity
38. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
Rogue access points
Vulnerability scanning
SSL
IPSec
39. Which of the following includes a photo and can be used for identification?
Install a network-based IDS
TPM
CAC
MAC
40. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
Cross-site scripting
Visibility - Accessibility - Neighborhood crime rate
IDEA and TripleDes
NIPS is blocking activities from those specific websites.
41. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Hot and cold aisles
Protocol analyzer
Before and after the imaging process and then hash the forensic image
Vulnerability scanning
42. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Confidentiality - Availability
Implicit deny
Location that meets power and connectivity requirementsdatacenter
43. Which of the following is another name for a malicious attacker?
IDEA and TripleDes
AC filtering - Disabled SSID broadcast
Black hat
Judgment
44. Which of the following is a best practice when securing a switch from physical access?
The remote router has ICMP blocked.
Integrity
Disable unused ports
The development team is transferring data to test systems using SFTP and SCP.
45. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
System A fails open. System B fails closed.
Least privilege
Check if relaying is denied for unauthorized domains
Footprinting
46. What key is used to encrypt an HTTPS session?
Software as a Service
DNS spoofing
MD5
Symmetric
47. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Polymorphic
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
IDEA and TripleDes
48. Separating of duties is valuable in deterring?
SNMP (also use to monitor the parameters of network devices)
Fiber optic
Fraud
Phishing techniques
49. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Vulnerability scan
1433
Trojans
Enact a policy banning users from bringing in personal music devices.
50. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
Video surveillance
Protocol analyzer
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
War driving
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests