SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
Data Encryption Standard (DES)
Forward to different RDP listening ports.
Mantraps
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
2. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
War driving
Polymorphic
To ensure that staff understands what data they are handling and processing
Multi-factor authentication.
3. Upper management decides which risk to mitigate based on cost. This is an example of:
Dumpster diving - Shoulder surfing
Physical control of the data
Before and after the imaging process and then hash the forensic image
quantitative risk assessment
4. Which of the following is the MOST secure method of utilizing FTP?
Fraud
FTPS
Software as a Service
A system that stops an attack in progress.
5. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Evil twin
Vulnerability scan
Add input validation to forms.
Decrease the power levels on the WAP
6. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
System A fails open. System B fails closed.
Enact a policy banning users from bringing in personal music devices.
Birthday - Full name
CCTV
8. Which of the following is MOST commonly a part of routine system audits?
Detective
User rights and permissions reviews
mitigation - acceptance - transference
Mandatory vacations
9. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
Power levels
Loop protection
Location that meets power and connectivity requirementsdatacenter
SSH
10. Performing routine security audits is a form of which of the following controls?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Check if relaying is denied for unauthorized domains
VLAN
Detective
11. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Software as a Service
Pharming - Logic bomb
Mandatory vacations
Firewall - VPN
12. Which of the following is a method to prevent ad-hoc configuration mistakes?
Algorithm
Integrity
Implement a change management strategy
Symmetric
13. Which of the following is a management control type?
Deny all
War driving
Vulnerability scanning
Command injection
14. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
quantitative risk assessment
Enact a policy banning users from bringing in personal music devices.
Mantrap
Before and after the imaging process and then hash the forensic image
15. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
Install a network-based IDS
The PC has become part of a botnet.
quantitative risk assessment
Privilege escalation
16. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
Risk transference
Virtual servers have the same information security requirements as physical servers.
Validate input to remove hypertext
Lets you minimize the attack surface relating to the application
17. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Social Engineering attack
1433
Block port 23 on the network firewall.
Baseline reporting
18. Which of the following is the primary difference between a virus and a worm?
Fault tolerance
Software as a Service (SaaS)
A worm is self-replicating
TPM
19. You are performing risk assessment for an organization. What should you do during impact assessment?
ID badges
Vulnerability scanning
Determine the potential monetary costs related to a threat
Mandatory vacations
20. Which of the following are the default ports for HTTP and HTTPS protocols?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Video surveillance
80 - 443
Vulnerability scan
21. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
Fiber optic
The development team is transferring data to test systems using SFTP and SCP.
AC filtering - Disabled SSID broadcast
IPSec
22. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
Buffer overflow
Having the offsite location of tapes also be the hot siteservers
White box
NIDS
23. Which of the following should be performed on a computer to protect the operating system from malicious software?
Birthday - Full name
Integrity and Authentication
Disable unused services - Update HIPS signatures
Deny all
24. Which of the following is true regarding the WTLS protocol?
It is used to provide data encryption for WAP connections.
Forward to different RDP listening ports.
Humidity
By masking the IP address of internal computers from the Internet
25. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
IPSec
Whaling
Information disclosure
IPv6
26. Which of the following is used for exchanging secret keys over an insecure public network?
Diffie-Hellman
Protocol analyzer
Vulnerability scanning
Content filtering
27. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Command injection
TCP SYN flood attack
Symmetric Key
Implicit deny
28. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
ICMP
Clean desk policy
It is used to provide data encryption for WAP connections.
Video surveillance
29. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Tailgating
Software as a Service
extremely slow and numerous antivirus alerts
25
30. Which of the following devices is often used to cache and filter content?
The user's PC is missing the authentication agent.
IPSec
Proxies
Fraud
31. What port does the Domain Name Service (DNS) use by default?
Confidentiality
White box
53
Principle of least privilege
32. What key is used to encrypt an HTTPS session?
Symmetric Key
NIPS is blocking activities from those specific websites.
Symmetric
Humidity
33. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
Virtual servers have the same information security requirements as physical servers.
War driving
Evil twin
Content filtering
34. Which of the following includes a photo and can be used for identification?
BIOS
The server is missing the default gateway.
DoS
CAC
35. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
IDS
IDEA and TripleDes
Gas
Determine the potential monetary costs related to a threat
36. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
Social Engineering attack
System A fails open. System B fails closed.
DNS spoofing
Software as a Service
37. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
The server is missing the default gateway.
Memory - network processes - and system processesserver. If the computer is powered off
Mantrap
VLAN segregation
38. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Firewall rulesflow of network traffic at the edge of the network
MAC
Least privilege
Chain of custody
39. What types of encryption are used for adding a digital signature to a message?
Clean desk policy
Asymmetric and Hashing
FTPS
SSL
40. Which of the following is MOST likely to be the last rule contained on any firewall?
Implement a change management strategy
Implicit deny
Man-in-the-middle
IDS
41. Which of the following should be installed to prevent employees from receiving unsolicited emails?
Install a network-based IDS
IPSec
Whaling
Spam filters
42. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Hierarchical list of critical systems
PEAP-TLS
Protocol analyzer
Accountability
43. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
Organize data based on severity and asset value.
The remote router has ICMP blocked.
TCP SYN flood attack
Confidentiality
44. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
Ensure a proper chain of custody
smurf attacks
Disable unused services - Update HIPS signatures
User rights
45. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
extremely slow and numerous antivirus alerts
IPSec
Change Management System
ACLs
46. What allows for all activities on a network or system to be traced to the user who performed them?
Virtual servers have the same information security requirements as physical servers.
Vulnerability scanner
Accountability
WPA2
47. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
Risk assessmentproduct Answer: D
Video surveillance
Baseline reporting
It is used to provide data encryption for WAP connections.
48. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
DoS
Evil twin
Implicit deny
MS-CHAP
49. How does a NAT server help protect your network?
VLAN
By masking the IP address of internal computers from the Internet
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
se file servers attached to an NAS system.
50. Which of the following concepts ensures that the data is only viewable to authorized users?
Implicit deny
Dumpster diving
Confidentiality
Detective
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests