SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is a technique designed to obtain information from a specific person?
Spear phishing
AES and TKIP
Having the offsite location of tapes also be the hot siteservers
War driving
2. Which of the following is a security control that is lost when using cloud computing?
Man-in-the-middle
Physical control of the data
Polymorphic
DNS spoofing
3. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
WPA2
Content filtering
Dumpster diving - Shoulder surfing
Birthday - Full name
4. Used in conjunction which of the following are PII?
Ensure a proper chain of custody
Birthday - Full name
Fiber optic
Trojans
5. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
TPM
Information disclosure
Check if relaying is denied for unauthorized domains
WPA2
6. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
Evil twin
Network Access Control
Fault tolerance
Blind FTP
7. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Baseline reporting
Account disablement
Footprinting
WPA2-PSK
8. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
25
content inspection.
NIDS
Bluesnarfing
9. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
Platform as a Service
Gas
Algorithm
Hierarchical list of critical systems
10. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi
Principle of least privilege
Diffie-Hellman
Fiber optic
White box
11. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
ICMP
Availability
Symmetric
The development team is transferring data to test systems using SFTP and SCP.
12. Which of the following describes when forensic hashing should occur on a drive?
IDEA and TripleDes
Before and after the imaging process and then hash the forensic image
User rights
Rootkit
13. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Confidentiality - Availability
Video surveillance
Algorithm
DAC
14. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
TLS
SYN attacks
Botnet
Rogue access points
15. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m
The new access point was mis-configured and is interfering with another nearby access point.
Multi-factor authentication.
Blind FTP
Add input validation to forms.
16. Separating of duties is valuable in deterring?
Fraud
VPN concentrator
System A fails open. System B fails closed.
Tailgating
17. Which of the following is an unauthorized wireless router that allows access to a secure network?
TCP SYN flood attack
Polymorphic
Integrity
Rogue access point
18. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
Accountability
A system that stops an attack in progress.
IDS
Dumpster diving
19. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Firewall - VPN
Segmentation of each wireless user from other wireless users
smurf attacks
DMZ
20. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
By masking the IP address of internal computers from the Internet
Lets you minimize the attack surface relating to the application
Check if relaying is denied for unauthorized domains
Polymorphic
21. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
Check if relaying is denied for unauthorized domains
smurf attacks
DMZ
AC filtering - Disabled SSID broadcast
22. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Privacy policy
BIOS
Whaling
WPA Enterprise
23. What are typical elements of authentication as part of physical access controls?
ID badges
NIPS is blocking activities from those specific websites.
Fiber optic
Configure the IE popup blockers
24. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
Detective
ACLs
Principle of least privilege
Vishing
25. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
Rogue access points
quantitative risk assessment
To provide documentation as to who has handled the evidence
Off-site backup
26. Which of the following protocols requires the use of a CA based authentication process?
TLS
PEAP-TLS
Rootkit
The server is missing the default gateway.
27. Which of the following BEST describes an intrusion prevention system?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
To minimize the organizational risk posed by users
A system that stops an attack in progress.
Footprinting
28. You are performing risk assessment for an organization. What should you do during impact assessment?
Determine the potential monetary costs related to a threat
Cognitive passwords
Dumpster diving
Blind FTP
29. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Determine open ports
Implicit deny
Install a network-based IDS
Enact a policy banning users from bringing in personal music devices.
30. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
Fraud
System A fails open. System B fails closed.
content inspection.
DMZ
31. What is the advantage of using application virtualization?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Man-in-the-middle
Lets you minimize the attack surface relating to the application
A worm is self-replicating
32. Which of the following risks may result from improper use of social networking and P2P software?
TLS
Information disclosure
Rogue access point
Least privilege
33. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
SYN attacks
Rogue access point
Configure the IE popup blockers
Install a network-based IDS
34. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
ARP poisoning
Vishing
Vulnerability scanning
Use SSH to connect to the Linux shell
35. MAC filtering is a form of which of the following?
Clustering
Network Access Control
ICMP
Man-in-the-middle
36. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
The PC has become part of a botnet.
Check if relaying is denied for unauthorized domains
TPM
Implicit deny
37. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
VPN concentrator
Polymorphic
Chain of custody
The server is missing the default gateway.
38. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
AC filtering - Disabled SSID broadcast
Forward to different RDP listening ports.
Memory - network processes - and system processesserver. If the computer is powered off
WPA2
39. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
NIPS is blocking activities from those specific websites.
Physical control of the data
Implicit deny
EMI shielding
40. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
White box
HSM
SYN attacks
The web site's private key.
41. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
Accountability
IPSec
Trojans
War driving
42. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Forward to different RDP listening ports.
Network Access Control
Hot and cold aisles
NIDS
43. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
Data Encryption Standard (DES)
Diffie-Hellman
Add input validation to forms.
S/MIME PGP
44. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Network Access Control
Vulnerability scan
The development team is transferring data to test systems using SFTP and SCP.
White box
45. Which of the following devices would allow a technician to view IP headers on a data packet?
Algorithm
Privilege escalation
IPSec
Protocol analyzer
46. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Change Management System
Logic Bomb
Multi-factor authentication.
Evil twin
47. Which of the following is true regarding the WTLS protocol?
Run the image through SHA256. Answer: D
TCP SYN flood attack
It is used to provide data encryption for WAP connections.
Implement a change management strategy
48. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Baseline reporting
Black hat
Off-site backup
Protocol analyzer
49. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Cross-site scripting
Principle of least privilege
Evil twin
mitigation - acceptance - transference
50. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Power levels
IPSec
War driving
Before and after the imaging process and then hash the forensic image
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests