SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is a management control type?
ACLs
Cross-site scripting
Vulnerability scanning
White box
2. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Load balancer
Check if relaying is denied for unauthorized domains
Before and after the imaging process and then hash the forensic image
CCTV
3. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
TPM
Gas
Integrity
Risk transference
4. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
ID badges
Rogue access points
Chain of custody
Principle of least privilege
5. Which of the following security threats does shredding mitigate?
Ensure a proper chain of custody
AES and TKIP
Social Engineering attack
Dumpster diving
6. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
Change Management System
TCP SYN flood attack
MAC
Mantraps
7. Which of the following describes when forensic hashing should occur on a drive?
ACLs
Before and after the imaging process and then hash the forensic image
Asset value
By masking the IP address of internal computers from the Internet
8. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
AC filtering - Disabled SSID broadcast
extremely slow and numerous antivirus alerts
The server is missing the default gateway.
To provide documentation as to who has handled the evidence
9. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
TCP SYN flood attack
Chain of custody
Multi-factor authentication.
ARP poisoning
10. Which of the following is used for exchanging secret keys over an insecure public network?
Diffie-Hellman
Check if relaying is denied for unauthorized domains
DAC
Validate input to remove hypertext
11. Which of the following uses TCP port 22 by default?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Visibility - Accessibility - Neighborhood crime rate
Business impact analysis
Phishing techniques
12. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
Provider cloud
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Footprinting
Symmetric Key
13. Which of the following BEST describes an intrusion prevention system?
A system that stops an attack in progress.
Implicit deny
Botnet
Pharming - Logic bomb
14. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
Software as a Service
Gas
Implicit deny
Principle of least privilege
15. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
ID badges
Algorithm
MAC
Separation of duties
16. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Privilege escalation
IKE
Mandated security configurations have been made to the operating system.
Integrity and Authentication
17. DRPs should contain which of the following?
The web site's public key.
Install a network-based IDS
Hierarchical list of critical systems
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
18. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
DMZ
Forward to different RDP listening ports.
Asset value
The PC has become part of a botnet.
19. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
Initial vector
EMI shielding
Business impact analysis
mitigation - acceptance - transference
20. Which of the following MUST a programmer implement to prevent cross-site scripting?
Integrity
Validate input to remove hypertext
Determine open ports
22
21. Which of the following are accomplished when a message is digitally signed?
Chain of custody
DES
Command injection
Integrity and Authentication
22. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Least privilege
IDS
Install a network-based IDS
80 - 443
24. Which environmental control is part of TEMPEST compliance?
WPA Enterprise
Implicit deny
Risk transference
Shielding
25. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Vulnerability scan
extremely slow and numerous antivirus alerts
Social Engineering attack
Platform as a Service
26. Which of the following is not an asymmetric system?
DES
IDEA and TripleDes
To minimize the organizational risk posed by users
Virtual servers have the same information security requirements as physical servers.
27. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
MAC
quantitative risk assessment
Mantraps
Determine the potential monetary costs related to a threat
28. With which of the following is RAID MOST concerned?
NIPS is blocking activities from those specific websites.
Visibility - Accessibility - Neighborhood crime rate
Availability
Vulnerability scanning
29. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
Separation of duties
Privacy policy
Mantraps
Software as a Service (SaaS)
30. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
Proxies
Memory - network processes - and system processesserver. If the computer is powered off
Check if relaying is denied for unauthorized domains
signing of a user agreement.
31. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
MS-CHAP
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Risk assessmentproduct Answer: D
Implicit deny
32. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Principle of least privilege
Hardware RAID 5 - Software RAID 1
User rights and permissions reviews
Baseline reporting
33. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Command injection
MAC filtering
Evil twin
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
34. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
TCP SYN flood attack
FTPS
Rootkit
MAC address
35. Which of the following is a security control that is lost when using cloud computing?
Physical control of the data
To minimize the organizational risk posed by users
Risk assessmentproduct Answer: D
Mandated security configurations have been made to the operating system.
36. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
MAC
Evil twin
IDS
Power levels
37. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
VLAN
Vulnerability scan
53
Provider cloud
38. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
The web site's public key.
Availability
AES and TKIP
Footprinting
39. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
War driving
SSL
Symmetric Key
Fiber optic
40. Which of the following would need to be configured correctly to allow remote access to the network?
content inspection.
Buffer overflow
Polymorphic
ACLs
41. Which of the following is the default rule found in a corporate firewall's access control list?
Virtual servers have the same information security requirements as physical servers.
AES and TKIP
Deny all
Rootkit
42. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
Vulnerability scan
White box
Algorithm
The server is missing the default gateway.
43. Which of the following is a technique designed to obtain information from a specific person?
Check if relaying is denied for unauthorized domains
Spear phishing
The web site's public key.
Security guard - Proximity reader
44. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Evil twin
Configure the IE popup blockers
Risk transference
Mantrap
45. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
DAC
Judgment
Validate input to remove hypertext
Memory - network processes - and system processesserver. If the computer is powered off
46. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
The server is missing the default gateway.
se file servers attached to an NAS system.
Clustering
Implement a change management strategy
47. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
SYN attacks
Mandatory vacation
Fault tolerance
Memory - network processes - and system processesserver. If the computer is powered off
48. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
MD5
EMI shielding
Implicit deny
Protocol analyzer
49. What types of encryption are used for adding a digital signature to a message?
Asymmetric and Hashing
Buffer overflow
Command injection
53
50. NIDS can also be used to help identify...
Disable unused ports
Risk transference
smurf attacks
IPSec