SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Forward to different RDP listening ports.
Polymorphic
S/MIME PGP
Confidentiality - Availability
2. Which of the following reduces the likelihood of a single point of failure when a server fails?
Diffie-Hellman
Clustering
escalation of privileges.
Lets you minimize the attack surface relating to the application
3. Which of the following BEST explains the security benefit of a standardized server image?
Mandated security configurations have been made to the operating system.
CAC
Install a network-based IDS
Vulnerability scan
4. Which of the following describes when forensic hashing should occur on a drive?
Physical control of the data
Implement a change management strategy
Before and after the imaging process and then hash the forensic image
Baseline reporting
5. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
Run the image through SHA256. Answer: D
TLS
Mantraps
Bluesnarfing
6. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
Implicit deny
TCP SYN flood attack
IDS
Security guard - Proximity reader
7. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?
DAC
Software as a Service (SaaS)
Fiber optic
The web site's private key.
8. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
TPM
IPSec
Mandatory vacation
Proxies
9. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
Privacy policy
MD5
Account disablement
MAC address
10. Which of the following assists in identifying if a system was properly handled during transport?
Video surveillance
Baseline reporting
Clustering
Chain of custody
11. What asymmetric key is used to decrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
Vishing
Network Access Control
The server is missing the default gateway.
Configure the IE popup blockers
13. Which of the following should be performed on a computer to protect the operating system from malicious software?
smurf attacks
Visibility - Accessibility - Neighborhood crime rate
Disable unused services - Update HIPS signatures
BIOS
14. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
TLS
Whaling
Hot and cold aisles
Forward to different RDP listening ports.
15. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
Memory - network processes - and system processesserver. If the computer is powered off
Add input validation to forms.
Algorithm
Proxies
16. Which of the following is true concerning email message encryption by using S/MIME?
Only the message data is encrypted
Protocol analyzer
Location that meets power and connectivity requirementsdatacenter
IDS
17. What allows for all activities on a network or system to be traced to the user who performed them?
Validate input to remove hypertext
Accountability
1433
Location that meets power and connectivity requirementsdatacenter
18. A company that purchases insurance to reduce risk is an example of which of the following?
Integrity and Authentication
Asset value
AES and TKIP
Risk transference
19. Which of the following is specific to a buffer overflow attack?
Change Management System
Initial vector
Location that meets power and connectivity requirementsdatacenter
signing of a user agreement.
20. Which of the following can prevent an unauthorized employee from entering a data center?
VLAN
Physical control of the data
Risk assessmentproduct Answer: D
Security guard - Proximity reader
21. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
To provide documentation as to who has handled the evidence
Install a network-based IDS
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
WPA Enterprise
22. Which of the following are the default ports for HTTP and HTTPS protocols?
Only the message data is encrypted
BIOS
IPSec
80 - 443
23. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
WPA Enterprise
Integrity and Authentication
SSH
War driving
24. Which of the following is used when performing a qualitative risk analysis?
Least privilege
Steganography
Judgment
IDEA and TripleDes
25. Which of the following is the BEST way to secure data for the purpose of retention?
TLS
Mantraps
Off-site backup
By masking the IP address of internal computers from the Internet
26. The detection of a NOOP sled is an indication of which of the following attacks?
Rootkit
AES and TKIP
quantitative risk assessment
Buffer overflow
27. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
VLAN
Software as a Service
Cross-site scripting
Principle of least privilege
28. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Run the image through SHA256. Answer: D
Ensure a proper chain of custody
Mantrap
Black hat
29. Which of the following MUST a programmer implement to prevent cross-site scripting?
Validate input to remove hypertext
WPA2
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Lets you minimize the attack surface relating to the application
30. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
IPSec
Cross-site scripting
Forward to different RDP listening ports.
The PC has become part of a botnet.
31. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
Clustering
DMZ
22
WPA2
32. Which of the following attacks would password masking help mitigate?
Social Engineering attack
VLAN segregation
Privacy policy
Shoulder surfing
33. Which of the following is a method to prevent ad-hoc configuration mistakes?
SYN attacks
Privacy policy
Implement a change management strategy
MAC filtering
34. On-going annual awareness security training should be coupled with:..
Accountability
Having the offsite location of tapes also be the hot siteservers
signing of a user agreement.
MAC filtering
35. Which of the following logical controls does a flood guard protect against?
DNS spoofing
Physical control of the data
Implicit deny
SYN attacks
36. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?
Pharming - Logic bomb
Platform as a Service
Rogue access point
Provider cloud
37. Which of the following facilitates computing for heavily utilized systems and networks?
Provider cloud
Man-in-the-middle
Configure the IE popup blockers
The development team is transferring data to test systems using SFTP and SCP.
38. The 802.11i standard specifies support for which encryption algorithms?
HSM
Footprinting
AES and TKIP
Loop protection
39. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
Content filtering
Footprinting
ACLs
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
40. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Buffer overflow
Platform as a Service
It is used to provide data encryption for WAP connections.
The development team is transferring data to test systems using SFTP and SCP.
41. Which of the following risks may result from improper use of social networking and P2P software?
SSL
Information disclosure
Disable unused ports
DAC
42. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Integrity
Video surveillance
Determine the potential monetary costs related to a threat
escalation of privileges.
43. Used in conjunction which of the following are PII?
Birthday - Full name
War driving
Social Engineering attack
To minimize the organizational risk posed by users
44. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Network Access Control
Integrity and Authentication
White box
Privilege escalation
45. Which of the following is MOST relevant to a buffer overflow attack?
Information disclosure
TLS
Segmentation of each wireless user from other wireless users
NOOP instructions
46. Which of the following is a security control that is lost when using cloud computing?
Power levels
Smurf attack
Physical control of the data
extremely slow and numerous antivirus alerts
47. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Vulnerability scanning
Integrity and Authentication
Mandated security configurations have been made to the operating system.
Blind FTP
48. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Implicit deny
Availability
Multi-factor authentication.
To ensure that staff understands what data they are handling and processing
49. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
Integrity
Bluesnarfing
Memory - network processes - and system processesserver. If the computer is powered off
Network Access Control
50. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
DNS spoofing
Firewall rulesflow of network traffic at the edge of the network
TPM
IPSec
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests