SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does a NAT server help protect your network?
IPv6
Man-in-the-middle
EMI shielding
By masking the IP address of internal computers from the Internet
2. Which of the following is used when performing a qualitative risk analysis?
Judgment
Dumpster diving
Security guard - Proximity reader
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
3. Which of the following is not an asymmetric system?
To minimize the organizational risk posed by users
DES
Principle of least privilege
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
4. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
CCTV
IPSec
FTPS
ACLs
5. In which of the following locations would a forensic analyst look to find a hooked process?
The server is missing the default gateway.
IPv6
BIOS
IKE
6. Which of the following port numbers is used for SCP by default?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Smurf attack
22
Vulnerability scanner
7. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
Before and after the imaging process and then hash the forensic image
Vishing
Ensure a proper chain of custody
ICMP
8. You are performing risk assessment for an organization. What should you do during impact assessment?
Deny all
22
Determine the potential monetary costs related to a threat
Only the message data is encrypted
9. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Cross-site scripting
Business impact analysis
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Spam filters
10. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Blind FTP
The user's PC is missing the authentication agent.
Accountability
The web site's private key.
11. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
Software as a Service
Virtual servers have the same information security requirements as physical servers.
Principle of least privilege
AES and TKIP
12. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?
ACLs
ARP poisoning
Fault tolerance
content inspection.
13. Which of the following BEST describes an intrusion prevention system?
A system that stops an attack in progress.
extremely slow and numerous antivirus alerts
It is used to provide data encryption for WAP connections.
Implement a change management strategy
14. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?
War driving
Loop protection
Social Engineering attack
Spear phishing
15. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Command injection
DMZ
Risk assessmentproduct Answer: D
16. Which of the following is specific to a buffer overflow attack?
The web site's private key.
Initial vector
Gas
Pharming - Logic bomb
17. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Symmetric Key
Command injection
Install a network-based IDS
Vishing
18. Which of the following is MOST relevant to a buffer overflow attack?
Pharming - Logic bomb
NOOP instructions
Clean desk policy
The PC has become part of a botnet.
19. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Symmetric Key
ACLs
Mantrap
Having the offsite location of tapes also be the hot siteservers
20. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
Confidentiality - Availability
IPSec
NOOP instructions
War driving
21. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
Forward to different RDP listening ports.
Pharming - Logic bomb
Whaling
Software as a Service
22. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
Video surveillance
Bluesnarfing
A system that stops an attack in progress.
Detective
23. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
Blind FTP
Business impact analysis
The remote router has ICMP blocked.
MAC
24. Which of the following is the MOST secure method of utilizing FTP?
IPv6
Social Engineering attack
Risk transference
FTPS
25. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
Information disclosure
Change Management System
ICMP
Spear phishing
26. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
System A fails open. System B fails closed.
Fault tolerance
smurf attacks
Lets you minimize the attack surface relating to the application
27. Performing routine security audits is a form of which of the following controls?
AC filtering - Disabled SSID broadcast
Account disablement
Detective
Ensure a proper chain of custody
28. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Fraud
Mantrap
Buffer overflow
Accountability
29. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
CCTV
Dumpster diving
Algorithm
Humidity
30. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Steganography
Having the offsite location of tapes also be the hot siteservers
Implicit deny
ICMP
31. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
Load balancer
PEAP-TLS
TPM
Mandatory vacation
32. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Implicit deny
Multi-factor authentication.
White box
Symmetric Key
33. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Integrity
System A fails open. System B fails closed.
Symmetric
Polymorphic
34. The detection of a NOOP sled is an indication of which of the following attacks?
Buffer overflow
CCTV
Pharming - Logic bomb
Configure the IE popup blockers
35. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
Smurf attack
The new access point was mis-configured and is interfering with another nearby access point.
escalation of privileges.
Baseline reporting
36. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Vulnerability scanner
Fraud
Principle of least privilege
Vulnerability scan
37. Which of the following environmental variables reduces the potential for static discharges?
Spear phishing
ID badges
Mandated security configurations have been made to the operating system.
Humidity
38. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
extremely slow and numerous antivirus alerts
To provide documentation as to who has handled the evidence
SSH
ARP poisoning
39. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
NIPS is blocking activities from those specific websites.
quantitative risk assessment
Use SSH to connect to the Linux shell
Rogue access points
40. Which of the following is the BEST choice for encryption on a wireless network?
Clean desk policy
WPA2-PSK
Information disclosure
Social Engineering attack
41. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Confidentiality - Availability
Detective
Add input validation to forms.
Bluesnarfing
42. A company that purchases insurance to reduce risk is an example of which of the following?
AES and TKIP
The user's PC is missing the authentication agent.
By masking the IP address of internal computers from the Internet
Risk transference
43. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
Install a network-based IDS
Man-in-the-middle
DMZ
SSH
45. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Proxies
Spear phishing
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
War driving
46. On-going annual awareness security training should be coupled with:..
signing of a user agreement.
Steganography
Use SSH to connect to the Linux shell
Hardware RAID 5 - Software RAID 1
47. Which of the following is true concerning email message encryption by using S/MIME?
MD5
Use SSH to connect to the Linux shell
Only the message data is encrypted
DMZ
48. What types of encryption are used for adding a digital signature to a message?
Cross-site scripting
Vulnerability scan
Asymmetric and Hashing
User rights
49. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
Shoulder surfing
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Principle of least privilege
Buffer overflow
50. What asymmetric key is used to decrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests