SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
53
NIDS
Buffer overflow
Footprinting
2. Which solution should you use?
se file servers attached to an NAS system.
SSH
Account disablement
AC filtering - Disabled SSID broadcast
3. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
White box
IDEA and TripleDes
Check if relaying is denied for unauthorized domains
Multi-factor authentication.
4. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
Validate input to remove hypertext
Man-in-the-middle
Smurf attack
Spam filters
5. With which of the following is RAID MOST concerned?
IKE
Availability
Symmetric Key
Confidentiality - Availability
6. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
Privilege escalation
Algorithm
ACLs
Firewall - VPN
7. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Multi-factor authentication.
Off-site backup
Hot and cold aisles
CCTV
8. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Tailgating
IKE
It is used to provide data encryption for WAP connections.
HSM
9. A system administrator could have a user level account and an administrator account to prevent:...
DNS spoofing
escalation of privileges.
Vulnerability scanning
A system that stops an attack in progress.
10. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
Multi-factor authentication.
Protocol analyzer
To provide documentation as to who has handled the evidence
Firewall - VPN
11. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
ICMP
Security guard - Proximity reader
Data Encryption Standard (DES)
Business impact analysis
12. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Footprinting
Validate input to remove hypertext
Integrity and Authentication
Cross-site scripting
13. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Firewall - VPN
TCP SYN flood attack
Command injection
The user's PC is missing the authentication agent.
14. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
The server is missing the default gateway.
22
DES
15. Which of the following would need to be configured correctly to allow remote access to the network?
Baseline reporting
Power levels
ACLs
Virtual servers have the same information security requirements as physical servers.
16. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
ACLs
Virtual servers have the same information security requirements as physical servers.
CCTV
53
17. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Protocol analyzer
S/MIME PGP
se file servers attached to an NAS system.
DNS spoofing
18. Which of the following logical controls does a flood guard protect against?
Visibility - Accessibility - Neighborhood crime rate
WPA2-PSK
SYN attacks
Principle of least privilege
19. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
User rights and permissions reviews
IPSec
Power levels
extremely slow and numerous antivirus alerts
20. Which of the following is a security control that is lost when using cloud computing?
Physical control of the data
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Proxies
Load balancer
21. Which of the following is a management control type?
Vulnerability scanning
White box
IPSec
Vulnerability scan
22. Which of the following security threats does shredding mitigate?
Dumpster diving
MS-CHAP
The PC has become part of a botnet.
Platform as a Service
23. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Least privilege
Run the image through SHA256. Answer: D
IDS
CAC
24. Which of the following is a reason to perform user awareness and training?
To minimize the organizational risk posed by users
Integrity and Authentication
War driving
Implicit deny
25. Which of the following environmental variables reduces the potential for static discharges?
Humidity
mitigation - acceptance - transference
Vulnerability scan
smurf attacks
26. Which of the following reduces the likelihood of a single point of failure when a server fails?
Clustering
Platform as a Service
Rogue access points
Block port 23 on the network firewall.
27. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Baseline reporting
Physical control of the data
Mandatory vacation
FTPS
28. Which of the following is the primary difference between a virus and a worm?
Configure the IE popup blockers
Enact a policy banning users from bringing in personal music devices.
A worm is self-replicating
Fiber optic
29. Which of the following are accomplished when a message is digitally signed?
se file servers attached to an NAS system.
Vishing
Integrity and Authentication
SSH
30. On-going annual awareness security training should be coupled with:..
signing of a user agreement.
EMI shielding
Content filtering
Confidentiality
31. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
Confidentiality - Availability
Hot and cold aisles
Rogue access points
DAC
32. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
MAC
Rogue access points
Lets you minimize the attack surface relating to the application
Validate input to remove hypertext
33. Which of the following is true concerning email message encryption by using S/MIME?
Mandatory vacation
Validate input to remove hypertext
Only the message data is encrypted
25
34. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
Fiber optic
War driving
Buffer overflow
Mandatory vacation
35. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
mitigation - acceptance - transference
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Virtual servers have the same information security requirements as physical servers.
Buffer overflow
36. Which of the following facilitates computing for heavily utilized systems and networks?
Provider cloud
MS-CHAP
Smurf attack
VLAN segregation
37. Which of the following are the default ports for HTTP and HTTPS protocols?
CAC
Humidity
Spam filters
80 - 443
38. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Least privilege
Forward to different RDP listening ports.
Hardware RAID 5 - Software RAID 1
Visibility - Accessibility - Neighborhood crime rate
39. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
Detective
HSM
80 - 443
Business impact analysis
40. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?
Rootkit
Phishing techniques
Fault tolerance
Clean desk policy
41. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Power levels
Account disablement
Organize data based on severity and asset value.
Determine the potential monetary costs related to a threat
42. In which of the following locations would a forensic analyst look to find a hooked process?
BIOS
The web site's private key.
Lets you minimize the attack surface relating to the application
Principle of least privilege
43. The detection of a NOOP sled is an indication of which of the following attacks?
Buffer overflow
Tailgating
NIDS
Lets you minimize the attack surface relating to the application
44. Which of the following is an unauthorized wireless router that allows access to a secure network?
Rogue access point
MAC address
TLS
Rootkit
45. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
Vulnerability scanning
MAC filtering
IDEA and TripleDes
DoS
46. Which of the following includes a photo and can be used for identification?
ARP poisoning
CAC
80 - 443
Run the image through SHA256. Answer: D
47. Which of the following is a method to prevent ad-hoc configuration mistakes?
Implement a change management strategy
Rogue access points
Provider cloud
Decrease the power levels on the WAP
48. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
The server is missing the default gateway.
Privacy policy
escalation of privileges.
System A fails open. System B fails closed.
49. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
DAC
Privilege escalation
DNS spoofing
NIPS is blocking activities from those specific websites.
50. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Business impact analysis
Smurf attack
Blind FTP
Vulnerability scan