SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
Location that meets power and connectivity requirementsdatacenter
White box
Accountability
Forward to different RDP listening ports.
2. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
Having the offsite location of tapes also be the hot siteservers
Buffer overflow
Trojans
The PC has become part of a botnet.
3. Which of the following logical controls does a flood guard protect against?
SYN attacks
25
DES
User rights
4. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
Content filtering
Configure the IE popup blockers
Protocol analyzer
Fiber optic
5. Performing routine security audits is a form of which of the following controls?
Detective
Symmetric Key
SSH
Availability
6. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
Account disablement
Hierarchical list of critical systems
War driving
Use SSH to connect to the Linux shell
7. Which of the following are accomplished when a message is digitally signed?
Proxies
Video surveillance
Provider cloud
Integrity and Authentication
8. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
DAC
Implement a change management strategy
Provider cloud
Chain of custody
9. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
Network Access Control
Organize data based on severity and asset value.
Social Engineering attack
Logic Bomb
10. Which of the following is not an asymmetric system?
Spear phishing
Software as a Service
Phishing techniques
DES
11. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?
Decrease the power levels on the WAP
Hardware RAID 5 - Software RAID 1
NOOP instructions
PEAP-TLS
12. What key is used to encrypt an HTTPS session?
Algorithm
Symmetric
Principle of least privilege
WPA2-PSK
13. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
War driving
Footprinting
Security guard - Proximity reader
Multi-factor authentication.
14. Which of the following BEST explains the security benefit of a standardized server image?
Clustering
Mandated security configurations have been made to the operating system.
Birthday - Full name
IPv6
15. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Mantrap
ICMP
content inspection.
Clean desk policy
16. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
MAC address
Man-in-the-middle
User rights and permissions reviews
Confidentiality - Availability
17. Which of the following includes a photo and can be used for identification?
Video surveillance
MD5
Asymmetric and Hashing
CAC
18. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Off-site backup
WPA Enterprise
Hardware RAID 5 - Software RAID 1
Forward to different RDP listening ports.
19. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
Organize data based on severity and asset value.
The new access point was mis-configured and is interfering with another nearby access point.
MAC address
SSH
20. Which of the following assists in identifying if a system was properly handled during transport?
Chain of custody
IPSec
1433
MAC
21. Which of the following port numbers is used for SCP by default?
Dumpster diving - Shoulder surfing
Disable unused services - Update HIPS signatures
22
Spear phishing
22. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
ACLs
Off-site backup
Rogue access point
Check if relaying is denied for unauthorized domains
23. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Blind FTP
TLS
It is used to provide data encryption for WAP connections.
The user's PC is missing the authentication agent.
24. Which of the following environmental variables reduces the potential for static discharges?
Humidity
The web site's public key.
MAC
Fiber optic
25. Which of the following is a detective security control?
CCTV
Tailgating
Provider cloud
AC filtering - Disabled SSID broadcast
26. Which of the following is MOST commonly a part of routine system audits?
Run the image through SHA256. Answer: D
Mantrap
Change Management System
User rights and permissions reviews
27. Which of the following is a management control type?
Load balancer
The user's PC is missing the authentication agent.
Vulnerability scan
Vulnerability scanning
28. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Spear phishing
Before and after the imaging process and then hash the forensic image
Social Engineering attack
Baseline reporting
29. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Asymmetric and Hashing
Organize data based on severity and asset value.
Hierarchical list of critical systems
Humidity
30. Which of the following reduces the likelihood of a single point of failure when a server fails?
War driving
SYN attacks
Clustering
Confidentiality - Availability
31. Which of the following would need to be configured correctly to allow remote access to the network?
Software as a Service
ACLs
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Asymmetric and Hashing
32. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Buffer overflow
Tailgating
PEAP-TLS
IPv6
33. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
Off-site backup
Man-in-the-middle
TPM
extremely slow and numerous antivirus alerts
34. Which of the following functions is MOST likely performed by a web security gateway?
AC filtering - Disabled SSID broadcast
DAC
Content filtering
Humidity
35. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
DMZ
SSL
Decrease the power levels on the WAP
Having the offsite location of tapes also be the hot siteservers
36. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Accountability
To minimize the organizational risk posed by users
Enact a policy banning users from bringing in personal music devices.
Buffer overflow
37. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
Privilege escalation
NIDS
1433
Memory - network processes - and system processesserver. If the computer is powered off
38. Which of the following should be performed on a computer to protect the operating system from malicious software?
Vulnerability scanner
Initial vector
HSM
Disable unused services - Update HIPS signatures
39. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
ACLs
TLS
AES and TKIP
Organize data based on severity and asset value.
40. What port does the Domain Name Service (DNS) use by default?
Cross-site scripting
ARP poisoning
53
The development team is transferring data to test systems using SFTP and SCP.
41. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
TCP SYN flood attack
Memory - network processes - and system processesserver. If the computer is powered off
Configure the IE popup blockers
CCTV
42. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
FTPS
User rights and permissions reviews
Rootkit
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
43. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Buffer overflow
A system that stops an attack in progress.
WPA2-PSK
ICMP
44. Which of the following is MOST likely to be the last rule contained on any firewall?
Implicit deny
TLS
Use SSH to connect to the Linux shell
IDS
45. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Vulnerability scanner
S/MIME PGP
DMZ
46. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Diffie-Hellman
Integrity
Detective
MAC
47. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Privilege escalation
Disable unused services - Update HIPS signatures
MAC filtering
Baseline reporting
48. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
White box
Run the image through SHA256. Answer: D
Hierarchical list of critical systems
MAC
49. Which of the following is the primary difference between a virus and a worm?
Smurf attack
Integrity and Authentication
A worm is self-replicating
Command injection
50. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
SSL
TPM
Disable unused ports
Only the message data is encrypted