SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is used for exchanging secret keys over an insecure public network?
DES
Diffie-Hellman
User rights
The remote router has ICMP blocked.
2. Which of the following concepts ensures that the data is only viewable to authorized users?
Hot and cold aisles
Confidentiality
Blind FTP
Configure the IE popup blockers
3. Which of the following should NOT be used with username/password authentication?
Only the message data is encrypted
25
22
Cognitive passwords
4. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
Protocol analyzer
The PC has become part of a botnet.
A system that stops an attack in progress.
MAC address
5. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
Data Encryption Standard (DES)
Multi-factor authentication.
IPSec
Initial vector
6. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
User rights
Mantraps
Steganography
IDS
7. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
Vulnerability scan
ACLs
Spear phishing
Implicit deny
8. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
1433
Dumpster diving - Shoulder surfing
Cross-site scripting
Proxies
9. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
Cross-site scripting
Run the image through SHA256. Answer: D
Smurf attack
Vulnerability scanner
10. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
White box
A worm is self-replicating
Confidentiality
Humidity
11. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
Gas
Clean desk policy
The user's PC is missing the authentication agent.
Buffer overflow
12. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Mantrap
WPA Enterprise
Virtual servers have the same information security requirements as physical servers.
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
13. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
Social Engineering attack
Network Access Control
A worm is self-replicating
Algorithm
14. Webmail is classified under which of the following cloud-based technologies?
Risk transference
Proxies
PEAP-TLS
Software as a Service (SaaS)
15. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
Initial vector
53
CCTV
Mandatory vacations
16. Which of the following encryption algorithms can be used in PGP for data encryption?
Protocol analyzer
Smurf attack
WPA2-PSK
IDEA and TripleDes
17. Which of the following is the primary difference between a virus and a worm?
User rights
The user's PC is missing the authentication agent.
Baseline reporting
A worm is self-replicating
18. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
Footprinting
Judgment
Vulnerability scanning
IPSec
19. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
NIDS
Vulnerability scan
Vulnerability scanning
The PC has become part of a botnet.
20. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
A worm is self-replicating
Risk assessmentproduct Answer: D
VLAN segregation
It is used to provide data encryption for WAP connections.
21. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Protocol analyzer
Baseline reporting
Steganography
Birthday - Full name
22. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
The remote router has ICMP blocked.
Information disclosure
Firewall rulesflow of network traffic at the edge of the network
Diffie-Hellman
23. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
IPv6
Forward to different RDP listening ports.
IPSec
Gas
24. Which of the following attacks would password masking help mitigate?
Shoulder surfing
Steganography
Blind FTP
User rights
25. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
Risk transference
A system that stops an attack in progress.
Whaling
Enact a policy banning users from bringing in personal music devices.
26. Performing routine security audits is a form of which of the following controls?
Detective
Evil twin
Risk transference
Implicit deny
27. Which of the following is used when performing a qualitative risk analysis?
Diffie-Hellman
Judgment
Baseline reporting
Loop protection
28. A company that purchases insurance to reduce risk is an example of which of the following?
Integrity and Authentication
WPA2
Risk transference
Fault tolerance
29. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
DMZ
PEAP-TLS
Dumpster diving - Shoulder surfing
It is used to provide data encryption for WAP connections.
30. Which of the following functions is MOST likely performed by a web security gateway?
Content filtering
ACLs
Software as a Service (SaaS)
Cross-site scripting
31. Which of the following logical controls does a flood guard protect against?
Check if relaying is denied for unauthorized domains
SYN attacks
Availability
Network Access Control
32. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Implicit deny
The PC has become part of a botnet.
Multi-factor authentication.
Network Access Control
33. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
MD5
Chain of custody
Availability
Clean desk policy
34. Which of the following BEST describes an intrusion prevention system?
TPM
Determine the potential monetary costs related to a threat
A system that stops an attack in progress.
Fraud
35. Which of the following is a technique designed to obtain information from a specific person?
Determine open ports
Risk assessmentproduct Answer: D
Vulnerability scan
Spear phishing
36. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Protocol analyzer
Rootkit
Mantraps
IPv6
37. Which of the following is a detective security control?
Determine the potential monetary costs related to a threat
Business impact analysis
CCTV
Initial vector
38. In which of the following locations would a forensic analyst look to find a hooked process?
Pharming - Logic bomb
Least privilege
BIOS
Implicit deny
39. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
White box
Organize data based on severity and asset value.
Block port 23 on the network firewall.
extremely slow and numerous antivirus alerts
40. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
Run the image through SHA256. Answer: D
Mandatory vacations
Confidentiality - Availability
IDS
41. Which of the following environmental variables reduces the potential for static discharges?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Load balancer
Run the image through SHA256. Answer: D
Humidity
42. With which of the following is RAID MOST concerned?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Availability
MAC address
Accountability
43. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
53
Mantraps
Risk assessmentproduct Answer: D
44. Which of the following is a reason to perform user awareness and training?
Trojans
Pharming - Logic bomb
Protocol analyzer
To minimize the organizational risk posed by users
45. Upper management decides which risk to mitigate based on cost. This is an example of:
quantitative risk assessment
Asset value
Vulnerability scan
IPSec
46. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
Location that meets power and connectivity requirementsdatacenter
DAC
Principle of least privilege
content inspection.
47. What allows for all activities on a network or system to be traced to the user who performed them?
MAC filtering
Accountability
VPN concentrator
VLAN
48. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
Change Management System
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Buffer overflow
Implement a change management strategy
49. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
VLAN segregation
Evil twin
A system that stops an attack in progress.
Botnet
50. Which of the following will provide the HIGHEST level of wireless network security?
MS-CHAP
WPA2
Pharming - Logic bomb
mitigation - acceptance - transference