SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
Risk assessmentproduct Answer: D
Off-site backup
The development team is transferring data to test systems using SFTP and SCP.
Confidentiality
2. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
DoS
Rogue access points
SSH
80 - 443
3. Which of the following is not an asymmetric system?
NOOP instructions
DES
The server is missing the default gateway.
Video surveillance
4. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
AC filtering - Disabled SSID broadcast
A system that stops an attack in progress.
Bluesnarfing
DMZ
5. How does a NAT server help protect your network?
Before and after the imaging process and then hash the forensic image
By masking the IP address of internal computers from the Internet
To ensure that staff understands what data they are handling and processing
Clean desk policy
6. Which of the following is specific to a buffer overflow attack?
Initial vector
Dumpster diving
A worm is self-replicating
ID badges
7. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
NIDS
To minimize the organizational risk posed by users
S/MIME PGP
Network Access Control
8. Webmail is classified under which of the following cloud-based technologies?
Business impact analysis
IPSec
Black hat
Software as a Service (SaaS)
9. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
ACLs
Bluesnarfing
Deny all
Buffer overflow
10. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Visibility - Accessibility - Neighborhood crime rate
Implicit deny
Buffer overflow
11. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
Symmetric Key
S/MIME PGP
Fraud
Mandatory vacation
12. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
War driving
PEAP-TLS
Firewall rulesflow of network traffic at the edge of the network
Ensure a proper chain of custody
13. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
NIPS is blocking activities from those specific websites.
Evil twin
Memory - network processes - and system processesserver. If the computer is powered off
The new access point was mis-configured and is interfering with another nearby access point.
14. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
DMZ
WPA2-PSK
Software as a Service (SaaS)
HSM
15. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Black hat
The user's PC is missing the authentication agent.
A worm is self-replicating
Least privilege
16. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Only the message data is encrypted
Block port 23 on the network firewall.
CCTV
Integrity
17. Which of the following is a reason to perform user awareness and training?
signing of a user agreement.
Principle of least privilege
To minimize the organizational risk posed by users
IPv6
18. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
The development team is transferring data to test systems using SFTP and SCP.
Principle of least privilege
smurf attacks
Validate input to remove hypertext
19. Which of the following facilitates computing for heavily utilized systems and networks?
Block port 23 on the network firewall.
Provider cloud
User rights and permissions reviews
To minimize the organizational risk posed by users
20. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
VLAN segregation
The web site's public key.
Multi-factor authentication.
Determine open ports
21. Which of the following concepts ensures that the data is only viewable to authorized users?
Confidentiality
Organize data based on severity and asset value.
Ensure a proper chain of custody
AES and TKIP
22. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Software as a Service (SaaS)
AC filtering - Disabled SSID broadcast
Vulnerability scan
Risk assessmentproduct Answer: D
23. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Pharming - Logic bomb
25
Rootkit
Man-in-the-middle
24. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Asymmetric and Hashing
Clean desk policy
War driving
Software as a Service (SaaS)
26. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
TCP SYN flood attack
Determine the potential monetary costs related to a threat
IPSec
Confidentiality
27. Which of the following is used when performing a quantitative risk analysis?
To ensure that staff understands what data they are handling and processing
Location that meets power and connectivity requirementsdatacenter
Asset value
Confidentiality
28. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Confidentiality
Run the image through SHA256. Answer: D
Steganography
The server is missing the default gateway.
30. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
S/MIME PGP
Trojans
User rights and permissions reviews
Diffie-Hellman
31. Which of the following describes a passive attempt to identify weaknesses?
Vulnerability scanning
Command injection
mitigation - acceptance - transference
Check if relaying is denied for unauthorized domains
32. What asymmetric key is used to decrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
Diffie-Hellman
Phishing techniques
Content filtering
System A fails open. System B fails closed.
34. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
Principle of least privilege
IDS
53
Gas
35. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Judgment
Organize data based on severity and asset value.
Symmetric
Before and after the imaging process and then hash the forensic image
36. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
IPv6
Chain of custody
Block port 23 on the network firewall.
Cognitive passwords
37. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Algorithm
Rootkit
escalation of privileges.
Detective
38. Which of the following port numbers is used for SCP by default?
Check if relaying is denied for unauthorized domains
Disable unused ports
Segmentation of each wireless user from other wireless users
22
39. Which of the following is the MOST secure method of utilizing FTP?
Vulnerability scanning
Vulnerability scanning
Lets you minimize the attack surface relating to the application
FTPS
40. Upper management decides which risk to mitigate based on cost. This is an example of:
Whaling
CAC
War driving
quantitative risk assessment
41. Which of the following allows a security administrator to set device traps?
Content filtering
SNMP (also use to monitor the parameters of network devices)
Principle of least privilege
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
42. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Fraud
Multi-factor authentication.
signing of a user agreement.
Humidity
43. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
1433
Organize data based on severity and asset value.
Hardware RAID 5 - Software RAID 1
War driving
44. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
S/MIME PGP
Shoulder surfing
Whaling
Confidentiality - Availability
45. Which of the following is used when performing a qualitative risk analysis?
Footprinting
Judgment
Run the image through SHA256. Answer: D
Determine the potential monetary costs related to a threat
46. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
A system that stops an attack in progress.
Check if relaying is denied for unauthorized domains
MD5
signing of a user agreement.
47. On-going annual awareness security training should be coupled with:..
Vulnerability scanning
signing of a user agreement.
Blind FTP
Dumpster diving
48. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
quantitative risk assessment
MAC address
IPv6
To provide documentation as to who has handled the evidence
49. Which of the following are the default ports for HTTP and HTTPS protocols?
Load balancer
NIDS
80 - 443
FTPS
50. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
Implement a change management strategy
MD5
NOOP instructions
Provide an appropriate ambient temperature and Maintain appropriate humidity levels