SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following would need to be configured correctly to allow remote access to the network?
Footprinting
ACLs
Mantraps
Baseline reporting
2. In which of the following locations would a forensic analyst look to find a hooked process?
AES and TKIP
BIOS
Asymmetric and Hashing
Confidentiality - Availability
3. Which of the following is a best practice when securing a switch from physical access?
WPA2-PSK
ARP poisoning
escalation of privileges.
Disable unused ports
4. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Firewall rulesflow of network traffic at the edge of the network
VLAN segregation
Buffer overflow
User rights
5. The 802.11i standard specifies support for which encryption algorithms?
AES and TKIP
content inspection.
Protocol analyzer
The web site's private key.
6. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
Decrease the power levels on the WAP
MAC address
IPSec
DMZ
7. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
Spear phishing
Software as a Service
Botnet
IPSec
8. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. Which solution should you use?
NIDS
TPM
MAC address
se file servers attached to an NAS system.
10. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Hardware RAID 5 - Software RAID 1
Humidity
Asymmetric and Hashing
Pharming - Logic bomb
11. MAC filtering is a form of which of the following?
Evil twin
Vulnerability scanner
Network Access Control
Vulnerability scan
12. Which of the following encryption algorithms can be used in PGP for data encryption?
Baseline reporting
Having the offsite location of tapes also be the hot siteservers
Separation of duties
IDEA and TripleDes
13. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
se file servers attached to an NAS system.
smurf attacks
NIDS
DMZ
14. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Install a network-based IDS
80 - 443
VPN concentrator
Power levels
15. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
Mandatory vacation
Detective
EMI shielding
Disable unused ports
16. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
Change Management System
NIPS is blocking activities from those specific websites.
Protocol analyzer
NOOP instructions
17. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
War driving
Rootkit
Initial vector
By masking the IP address of internal computers from the Internet
18. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
The server is missing the default gateway.
Off-site backup
Add input validation to forms.
Blind FTP
19. For which of the following is centralized key management most complicated?
Organize data based on severity and asset value.
War driving
Symmetric Key
Firewall rulesflow of network traffic at the edge of the network
20. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Block port 23 on the network firewall.
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Implicit deny
DoS
21. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Blind FTP
Add input validation to forms.
System A fails open. System B fails closed.
Having the offsite location of tapes also be the hot siteservers
22. What port does the Domain Name Service (DNS) use by default?
Polymorphic
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
HSM
53
23. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?
Firewall rulesflow of network traffic at the edge of the network
Symmetric Key
Phishing techniques
To minimize the organizational risk posed by users
24. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
IPSec
MAC address
Buffer overflow
ACLs
25. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
Polymorphic
Availability
Implicit deny
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
26. Which of the following is used when performing a qualitative risk analysis?
Symmetric Key
ACLs
Judgment
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
27. Which of the following is true concerning email message encryption by using S/MIME?
22
Only the message data is encrypted
Polymorphic
Footprinting
28. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
AC filtering - Disabled SSID broadcast
22
Asymmetric and Hashing
User rights and permissions reviews
29. Which of the following is not an asymmetric system?
TCP SYN flood attack
DES
MAC filtering
Ensure a proper chain of custody
30. Which of the following BEST describes an intrusion prevention system?
To ensure that staff understands what data they are handling and processing
quantitative risk assessment
A system that stops an attack in progress.
Vulnerability scan
31. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
Security guard - Proximity reader
Video surveillance
DMZ
MAC address
32. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
Least privilege
System A fails open. System B fails closed.
ID badges
Off-site backup
33. What asymmetric key is used to decrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. What are typical elements of authentication as part of physical access controls?
Block port 23 on the network firewall.
ID badges
quantitative risk assessment
Mandated security configurations have been made to the operating system.
35. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
CAC
Integrity
Blind FTP
Business impact analysis
36. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Buffer overflow
TLS
Clean desk policy
IPSec
37. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Provider cloud
Mantrap
Principle of least privilege
IPSec
38. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
Evil twin
Trojans
Video surveillance
Asset value
39. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
Baseline reporting
Visibility - Accessibility - Neighborhood crime rate
MS-CHAP
To minimize the organizational risk posed by users
40. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
By masking the IP address of internal computers from the Internet
Algorithm
Whaling
Risk assessmentproduct Answer: D
41. Which of the following describes when forensic hashing should occur on a drive?
Footprinting
Before and after the imaging process and then hash the forensic image
War driving
ACLs
42. Which of the following devices would allow a technician to view IP headers on a data packet?
Protocol analyzer
System A fails open. System B fails closed.
The remote router has ICMP blocked.
Symmetric
43. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
Determine the potential monetary costs related to a threat
The remote router has ICMP blocked.
SNMP (also use to monitor the parameters of network devices)
Bluesnarfing
44. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Multi-factor authentication.
Dumpster diving
Shielding
IDS
45. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
Steganography
Check if relaying is denied for unauthorized domains
Detective
Smurf attack
46. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Footprinting
VPN concentrator
Asset value
Steganography
47. Which of the following risks may result from improper use of social networking and P2P software?
IPSec
Shoulder surfing
Implicit deny
Information disclosure
48. Which environmental control is part of TEMPEST compliance?
It is used to provide data encryption for WAP connections.
DMZ
Shielding
mitigation - acceptance - transference
49. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Account disablement
Visibility - Accessibility - Neighborhood crime rate
Protocol analyzer
The remote router has ICMP blocked.
50. Which of the following attacks would password masking help mitigate?
Rogue access points
IPv6
Security guard - Proximity reader
Shoulder surfing