SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is the default rule found in a corporate firewall's access control list?
Deny all
Shielding
AES and TKIP
Provider cloud
2. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
Deny all
TCP SYN flood attack
Vishing
Principle of least privilege
3. Risk can be managed in the following ways...
mitigation - acceptance - transference
IDEA and TripleDes
Least privilege
se file servers attached to an NAS system.
4. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
It is used to provide data encryption for WAP connections.
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Polymorphic
SSL
5. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
Judgment
Video surveillance
Asset value
Loop protection
6. Which of the following should NOT be used with username/password authentication?
Risk transference
quantitative risk assessment
Cognitive passwords
WPA2
7. What are typical elements of authentication as part of physical access controls?
Integrity
ID badges
Privacy policy
Hierarchical list of critical systems
8. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
MS-CHAP
Install a network-based IDS
quantitative risk assessment
Baseline reporting
9. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
Cognitive passwords
Evil twin
Protocol analyzer
Fraud
10. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
Gas
smurf attacks
Vishing
SYN attacks
11. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Account disablement
22
Organize data based on severity and asset value.
EMI shielding
12. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
A system that stops an attack in progress.
HSM
Business impact analysis
Configure the IE popup blockers
13. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?
Fiber optic
Principle of least privilege
HSM
NIPS is blocking activities from those specific websites.
14. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
Evil twin
VLAN segregation
Accountability
Off-site backup
15. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
Privacy policy
Asset value
The remote router has ICMP blocked.
Separation of duties
16. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
BIOS
Trojans
MAC address
TLS
17. Which of the following is NOT an application layer security protocol?
Network Access Control
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
IPSec
quantitative risk assessment
18. Which of the following includes a photo and can be used for identification?
Hardware RAID 5 - Software RAID 1
VLAN segregation
Least privilege
CAC
19. What types of encryption are used for adding a digital signature to a message?
Asymmetric and Hashing
Memory - network processes - and system processesserver. If the computer is powered off
Mandatory vacation
MAC
20. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
1433
Fault tolerance
ACLs
Run the image through SHA256. Answer: D
21. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
A worm is self-replicating
Use SSH to connect to the Linux shell
Disable unused ports
Mandated security configurations have been made to the operating system.
22. Isolation mode on an AP provides which of the following functionality types?
Memory - network processes - and system processesserver. If the computer is powered off
Software as a Service (SaaS)
Segmentation of each wireless user from other wireless users
Business impact analysis
23. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Bluesnarfing
Having the offsite location of tapes also be the hot siteservers
escalation of privileges.
Implicit deny
24. The detection of a NOOP sled is an indication of which of the following attacks?
Algorithm
ACLs
Buffer overflow
Blind FTP
25. Which of the following is used when performing a quantitative risk analysis?
The web site's public key.
Asset value
Baseline reporting
IPSec
26. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Least privilege
Fraud
Cross-site scripting
The user's PC is missing the authentication agent.
27. Which of the following BEST describes the proper method and reason to implement port security?
Data Encryption Standard (DES)
Smurf attack
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
IPv6
28. Which of the following is MOST commonly a part of routine system audits?
Bluesnarfing
Implicit deny
User rights and permissions reviews
Rootkit
29. Which of the following logical controls does a flood guard protect against?
Information disclosure
SYN attacks
80 - 443
Gas
30. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
IPSec
ICMP
Implicit deny
Chain of custody
31. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Separation of duties
Firewall - VPN
Judgment
IDEA and TripleDes
32. Which of the following devices is often used to cache and filter content?
The user's PC is missing the authentication agent.
It is used to provide data encryption for WAP connections.
ACLs
Proxies
33. A system administrator could have a user level account and an administrator account to prevent:...
Physical control of the data
MAC
Integrity
escalation of privileges.
34. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Logic Bomb
Add input validation to forms.
Vulnerability scan
Birthday - Full name
35. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
Business impact analysis
Loop protection
DMZ
IPv6
36. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
Rogue access points
Judgment
Decrease the power levels on the WAP
MD5
37. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
DoS
Mandatory vacation
ID badges
Load balancer
38. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
By masking the IP address of internal computers from the Internet
The user's PC is missing the authentication agent.
S/MIME PGP
DoS
39. Which of the following assists in identifying if a system was properly handled during transport?
Security guard - Proximity reader
User rights
Clustering
Chain of custody
40. Which of the following port numbers is used for SCP by default?
WPA Enterprise
TPM
IDS
22
41. Which of the following functions is MOST likely performed by a web security gateway?
Business impact analysis
Dumpster diving - Shoulder surfing
Content filtering
Vulnerability scanner
42. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Bluesnarfing
AC filtering - Disabled SSID broadcast
Buffer overflow
43. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
Location that meets power and connectivity requirementsdatacenter
White box
Decrease the power levels on the WAP
The PC has become part of a botnet.
44. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
Baseline reporting
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
VLAN
Forward to different RDP listening ports.
45. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
Pharming - Logic bomb
Virtual servers have the same information security requirements as physical servers.
extremely slow and numerous antivirus alerts
FTPS
46. Which of the following risks may result from improper use of social networking and P2P software?
Fiber optic
Protocol analyzer
Information disclosure
Validate input to remove hypertext
47. How does a NAT server help protect your network?
CCTV
Detective
Data Encryption Standard (DES)
By masking the IP address of internal computers from the Internet
48. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
System A fails open. System B fails closed.
Gas
Footprinting
Firewall rulesflow of network traffic at the edge of the network
49. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Protocol analyzer
ICMP
Use SSH to connect to the Linux shell
Provider cloud
50. Webmail is classified under which of the following cloud-based technologies?
Virtual servers have the same information security requirements as physical servers.
Software as a Service (SaaS)
Steganography
White box
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests