SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
Baseline reporting
Bluesnarfing
ICMP
PEAP-TLS
3. You are performing risk assessment for an organization. What should you do during impact assessment?
Determine the potential monetary costs related to a threat
War driving
Risk transference
Principle of least privilege
4. What are typical elements of authentication as part of physical access controls?
A worm is self-replicating
ID badges
Symmetric Key
WPA2-PSK
5. Which of the following should be enabled to ensure only certain wireless clients can access the network?
VLAN
MAC filtering
Fault tolerance
Principle of least privilege
6. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
MAC
escalation of privileges.
Integrity
Gas
7. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
TLS
Fraud
Vulnerability scan
A worm is self-replicating
8. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
25
Multi-factor authentication.
AC filtering - Disabled SSID broadcast
Symmetric Key
9. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Content filtering
Risk assessmentproduct Answer: D
Least privilege
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
10. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
NOOP instructions
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Run the image through SHA256. Answer: D
Before and after the imaging process and then hash the forensic image
11. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
War driving
Protocol analyzer
VPN concentrator
MAC
12. On-going annual awareness security training should be coupled with:..
VLAN segregation
signing of a user agreement.
Power levels
Off-site backup
13. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
Social Engineering attack
Confidentiality - Availability
Least privilege
Smurf attack
14. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
EMI shielding
ACLs
VLAN
NIPS is blocking activities from those specific websites.
15. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
Business impact analysis
Bluesnarfing
Off-site backup
To provide documentation as to who has handled the evidence
16. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Disable unused services - Update HIPS signatures
SSL
Mantrap
Enact a policy banning users from bringing in personal music devices.
17. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
MS-CHAP
Baseline reporting
Decrease the power levels on the WAP
25
18. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
Buffer overflow
Add input validation to forms.
Pharming - Logic bomb
Ensure a proper chain of custody
19. Which of the following BEST describes the proper method and reason to implement port security?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Detective
Separation of duties
Memory - network processes - and system processesserver. If the computer is powered off
20. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
MAC filtering
Fiber optic
Hot and cold aisles
Mandated security configurations have been made to the operating system.
21. The 802.11i standard specifies support for which encryption algorithms?
TLS
DNS spoofing
AES and TKIP
Run the image through SHA256. Answer: D
22. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Footprinting
Risk transference
Fault tolerance
ID badges
23. Which of the following is another name for a malicious attacker?
Lets you minimize the attack surface relating to the application
Black hat
SSL
Mandatory vacation
24. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
Hot and cold aisles
Account disablement
TCP SYN flood attack
Cross-site scripting
25. Which of the following assists in identifying if a system was properly handled during transport?
SYN attacks
Least privilege
Chain of custody
Spear phishing
26. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
80 - 443
25
Vulnerability scanning
Dumpster diving - Shoulder surfing
27. Which of the following is true concerning email message encryption by using S/MIME?
Only the message data is encrypted
The development team is transferring data to test systems using SFTP and SCP.
Before and after the imaging process and then hash the forensic image
Baseline reporting
28. Which of the following is NOT an application layer security protocol?
The web site's public key.
Rogue access point
IPSec
To ensure that staff understands what data they are handling and processing
29. What types of encryption are used for adding a digital signature to a message?
WPA2
Buffer overflow
Baseline reporting
Asymmetric and Hashing
30. Which of the following is MOST likely to be the last rule contained on any firewall?
Implicit deny
DMZ
Business impact analysis
Power levels
31. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
Integrity
Whaling
Change Management System
Symmetric
32. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
A worm is self-replicating
Polymorphic
extremely slow and numerous antivirus alerts
Privacy policy
33. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces
IDEA and TripleDes
CCTV
System A fails open. System B fails closed.
Install a network-based IDS
34. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Spear phishing
Clean desk policy
VPN concentrator
Cross-site scripting
35. Which of the following are the default ports for HTTP and HTTPS protocols?
Dumpster diving
A worm is self-replicating
Chain of custody
80 - 443
36. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
MAC
Implement a change management strategy
Vulnerability scan
SSL
37. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
War driving
Install a network-based IDS
Validate input to remove hypertext
Buffer overflow
38. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
EMI shielding
To ensure that staff understands what data they are handling and processing
escalation of privileges.
Asymmetric and Hashing
39. Which of the following devices is often used to cache and filter content?
PEAP-TLS
NOOP instructions
Proxies
Tailgating
40. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Power levels
mitigation - acceptance - transference
The new access point was mis-configured and is interfering with another nearby access point.
Multi-factor authentication.
41. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Chain of custody
Rootkit
Footprinting
Protocol analyzer
42. Which of the following includes a photo and can be used for identification?
CAC
signing of a user agreement.
Organize data based on severity and asset value.
Visibility - Accessibility - Neighborhood crime rate
43. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Virtual servers have the same information security requirements as physical servers.
Having the offsite location of tapes also be the hot siteservers
Firewall rulesflow of network traffic at the edge of the network
Validate input to remove hypertext
44. Which of the following is the MOST secure method of utilizing FTP?
FTPS
Clustering
Hierarchical list of critical systems
Run the image through SHA256. Answer: D
45. Which of the following allows a security administrator to set device traps?
Determine the potential monetary costs related to a threat
80 - 443
SNMP (also use to monitor the parameters of network devices)
DoS
46. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Least privilege
Dumpster diving - Shoulder surfing
TLS
MD5
47. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
To provide documentation as to who has handled the evidence
MAC filtering
Clustering
The development team is transferring data to test systems using SFTP and SCP.
48. Which of the following is the BEST choice for encryption on a wireless network?
System A fails open. System B fails closed.
ARP poisoning
WPA2-PSK
The remote router has ICMP blocked.
49. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
HSM
Mandated security configurations have been made to the operating system.
The user's PC is missing the authentication agent.
Confidentiality - Availability
50. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
80 - 443
CCTV
Cross-site scripting
Privilege escalation