SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
Mantrap
Software as a Service (SaaS)
Visibility - Accessibility - Neighborhood crime rate
Smurf attack
2. Which of the following should be performed on a computer to protect the operating system from malicious software?
Protocol analyzer
Spear phishing
Location that meets power and connectivity requirementsdatacenter
Disable unused services - Update HIPS signatures
3. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
Social Engineering attack
Judgment
DMZ
25
4. Which of the following includes a photo and can be used for identification?
Install a network-based IDS
Implicit deny
CAC
Software as a Service
5. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
EMI shielding
Cross-site scripting
DMZ
Add input validation to forms.
6. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
IPSec
ACLs
Dumpster diving
Social Engineering attack
7. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
se file servers attached to an NAS system.
Trojans
User rights
Block port 23 on the network firewall.
8. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
MAC address
User rights and permissions reviews
Mantrap
Check if relaying is denied for unauthorized domains
9. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
Power levels
Separation of duties
extremely slow and numerous antivirus alerts
Mandated security configurations have been made to the operating system.
10. The detection of a NOOP sled is an indication of which of the following attacks?
A worm is self-replicating
Buffer overflow
Asset value
WPA Enterprise
11. Which of the following concepts ensures that the data is only viewable to authorized users?
mitigation - acceptance - transference
DAC
Confidentiality
IPSec
12. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Network Access Control
IPSec
Privilege escalation
Asymmetric and Hashing
13. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
Accountability
Memory - network processes - and system processesserver. If the computer is powered off
MAC
MAC address
14. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
Whaling
Deny all
Decrease the power levels on the WAP
Rogue access points
15. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
Baseline reporting
Protocol analyzer
Accountability
Vulnerability scanning
16. Which of the following devices would allow a technician to view IP headers on a data packet?
SSH
Protocol analyzer
Vulnerability scan
Disable unused services - Update HIPS signatures
17. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Dumpster diving - Shoulder surfing
Physical control of the data
Phishing techniques
Fiber optic
18. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
DNS spoofing
VPN concentrator
Ensure a proper chain of custody
Clean desk policy
19. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Firewall - VPN
DES
CCTV
WPA Enterprise
20. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
BIOS
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Steganography
Configure the IE popup blockers
21. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
FTPS
Hot and cold aisles
Principle of least privilege
MAC
22. Which of the following is MOST commonly a part of routine system audits?
User rights and permissions reviews
Loop protection
Validate input to remove hypertext
Hardware RAID 5 - Software RAID 1
23. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
VLAN
The web site's private key.
TLS
Shoulder surfing
24. Which of the following describes when forensic hashing should occur on a drive?
Separation of duties
Load balancer
Before and after the imaging process and then hash the forensic image
To minimize the organizational risk posed by users
25. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
Vulnerability scanning
S/MIME PGP
Integrity
It is used to provide data encryption for WAP connections.
26. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
Enact a policy banning users from bringing in personal music devices.
IDEA and TripleDes
Botnet
Principle of least privilege
27. Which of the following BEST describes the proper method and reason to implement port security?
War driving
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Risk assessmentproduct Answer: D
MD5
28. Which of the following is the MOST secure method of utilizing FTP?
Phishing techniques
WPA2-PSK
FTPS
Gas
29. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
The server is missing the default gateway.
Proxies
War driving
MD5
30. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
Privilege escalation
53
extremely slow and numerous antivirus alerts
Add input validation to forms.
31. Which of the following identifies some of the running services on a system?
Protocol analyzer
MAC
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Determine open ports
32. Which of the following are accomplished when a message is digitally signed?
Rogue access points
Provider cloud
Man-in-the-middle
Integrity and Authentication
33. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
Business impact analysis
Fault tolerance
User rights
Ensure a proper chain of custody
34. Webmail is classified under which of the following cloud-based technologies?
Diffie-Hellman
Software as a Service (SaaS)
Buffer overflow
Mandatory vacations
35. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Integrity and Authentication
CAC
WPA Enterprise
Firewall rulesflow of network traffic at the edge of the network
36. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
NIDS
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Man-in-the-middle
Install a network-based IDS
37. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
Chain of custody
NIPS is blocking activities from those specific websites.
Add input validation to forms.
VPN concentrator
38. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
Disable unused services - Update HIPS signatures
Content filtering
Implicit deny
DNS spoofing
39. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
TPM
Change Management System
User rights and permissions reviews
The remote router has ICMP blocked.
40. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
WPA2
CCTV
Buffer overflow
Check if relaying is denied for unauthorized domains
41. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
To ensure that staff understands what data they are handling and processing
Man-in-the-middle
Information disclosure
DAC
42. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
Software as a Service (SaaS)
System A fails open. System B fails closed.
WPA Enterprise
Determine open ports
43. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
Software as a Service
Principle of least privilege
Logic Bomb
VPN concentrator
44. What key is used to encrypt an HTTPS session?
Software as a Service
War driving
Symmetric
Video surveillance
45. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Cross-site scripting
Man-in-the-middle
Tailgating
Spam filters
46. How does a NAT server help protect your network?
Fault tolerance
By masking the IP address of internal computers from the Internet
Having the offsite location of tapes also be the hot siteservers
Location that meets power and connectivity requirementsdatacenter
47. NIDS can also be used to help identify...
Run the image through SHA256. Answer: D
content inspection.
smurf attacks
MAC
48. Which of the following is an unauthorized wireless router that allows access to a secure network?
Implicit deny
Command injection
Rogue access point
Clean desk policy
49. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
DoS
TCP SYN flood attack
Privacy policy
50. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Footprinting
Rogue access points
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
IDS