SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
System A fails open. System B fails closed.
AES and TKIP
Diffie-Hellman
SSL
2. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi
Steganography
VLAN segregation
Principle of least privilege
Footprinting
3. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Run the image through SHA256. Answer: D
se file servers attached to an NAS system.
Lets you minimize the attack surface relating to the application
ICMP
4. Which of the following is a best practice when securing a switch from physical access?
Change Management System
Location that meets power and connectivity requirementsdatacenter
Use SSH to connect to the Linux shell
Disable unused ports
5. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Hot and cold aisles
Use SSH to connect to the Linux shell
Protocol analyzer
quantitative risk assessment
6. What key is used to encrypt an HTTPS session?
Symmetric
Security guard - Proximity reader
Humidity
1433
7. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Tailgating
Availability
Mandatory vacation
War driving
8. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
DoS
Command injection
A system that stops an attack in progress.
se file servers attached to an NAS system.
9. Which of the following devices would allow a technician to view IP headers on a data packet?
Physical control of the data
Protocol analyzer
Off-site backup
Vulnerability scan
10. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
The remote router has ICMP blocked.
Fiber optic
The PC has become part of a botnet.
Account disablement
11. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Confidentiality
Command injection
TPM
12. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
The user's PC is missing the authentication agent.
Gas
Disable unused services - Update HIPS signatures
MAC
13. On-going annual awareness security training should be coupled with:..
signing of a user agreement.
AES and TKIP
Botnet
Before and after the imaging process and then hash the forensic image
14. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Trojans
Fault tolerance
Virtual servers have the same information security requirements as physical servers.
Organize data based on severity and asset value.
15. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
Spam filters
User rights and permissions reviews
Steganography
Gas
16. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
Load balancer
Memory - network processes - and system processesserver. If the computer is powered off
Check if relaying is denied for unauthorized domains
Rogue access point
17. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Fraud
Clean desk policy
The web site's private key.
Use SSH to connect to the Linux shell
18. Which of the following risks may result from improper use of social networking and P2P software?
Virtual servers have the same information security requirements as physical servers.
User rights
Information disclosure
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
19. Used in conjunction which of the following are PII?
Disable unused ports
Birthday - Full name
Multi-factor authentication.
SYN attacks
20. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
Vulnerability scan
Determine open ports
DNS spoofing
Phishing techniques
21. What are typical elements of authentication as part of physical access controls?
Mantraps
IDS
Baseline reporting
ID badges
22. Which of the following is a method to prevent ad-hoc configuration mistakes?
25
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Implement a change management strategy
Video surveillance
23. Which of the following is a security control that is lost when using cloud computing?
Physical control of the data
Block port 23 on the network firewall.
Gas
Firewall rulesflow of network traffic at the edge of the network
24. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
Location that meets power and connectivity requirementsdatacenter
1433
Protocol analyzer
SNMP (also use to monitor the parameters of network devices)
25. Which of the following is the MOST secure method of utilizing FTP?
User rights
FTPS
Ensure a proper chain of custody
Symmetric
26. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Protocol analyzer
Hierarchical list of critical systems
Privilege escalation
HSM
27. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Add input validation to forms.
Humidity
VPN concentrator
Blind FTP
28. Separating of duties is valuable in deterring?
Platform as a Service
Firewall rulesflow of network traffic at the edge of the network
Fraud
Polymorphic
29. Which of the following BEST describes the proper method and reason to implement port security?
EMI shielding
Forward to different RDP listening ports.
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
mitigation - acceptance - transference
30. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Vulnerability scan
Firewall rulesflow of network traffic at the edge of the network
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Determine open ports
31. Which of the following facilitates computing for heavily utilized systems and networks?
Shoulder surfing
Vulnerability scan
Protocol analyzer
Provider cloud
32. Which of the following security threats does shredding mitigate?
Mandatory vacation
Dumpster diving
IKE
Mandated security configurations have been made to the operating system.
33. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
Install a network-based IDS
53
Birthday - Full name
Baseline reporting
34. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
To provide documentation as to who has handled the evidence
80 - 443
To ensure that staff understands what data they are handling and processing
53
35. Which of the following is the default rule found in a corporate firewall's access control list?
The PC has become part of a botnet.
Privilege escalation
To ensure that staff understands what data they are handling and processing
Deny all
36. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
Fraud
HSM
Determine the potential monetary costs related to a threat
Visibility - Accessibility - Neighborhood crime rate
37. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
TCP SYN flood attack
Buffer overflow
Spam filters
Run the image through SHA256. Answer: D
38. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
Fiber optic
VPN concentrator
HSM
Pharming - Logic bomb
39. What is the advantage of using application virtualization?
The development team is transferring data to test systems using SFTP and SCP.
Configure the IE popup blockers
Lets you minimize the attack surface relating to the application
80 - 443
40. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Mantraps
War driving
User rights and permissions reviews
Vulnerability scan
41. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
S/MIME PGP
Symmetric Key
Confidentiality
Cognitive passwords
42. Which of the following is a technique designed to obtain information from a specific person?
MS-CHAP
Spear phishing
By masking the IP address of internal computers from the Internet
Rootkit
43. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
Mantrap
Asset value
DAC
Rogue access point
44. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
53
Load balancer
Multi-factor authentication.
Privilege escalation
45. You are performing risk assessment for an organization. What should you do during impact assessment?
escalation of privileges.
The user's PC is missing the authentication agent.
Rogue access points
Determine the potential monetary costs related to a threat
46. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Hot and cold aisles
Vulnerability scanning
Principle of least privilege
Cross-site scripting
47. Which of the following describes when forensic hashing should occur on a drive?
mitigation - acceptance - transference
Lets you minimize the attack surface relating to the application
Buffer overflow
Before and after the imaging process and then hash the forensic image
48. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Integrity
Check if relaying is denied for unauthorized domains
Spear phishing
Vulnerability scan
49. Which of the following should be performed on a computer to protect the operating system from malicious software?
DMZ
Steganography
Confidentiality
Disable unused services - Update HIPS signatures
50. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183