SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Cross-site scripting
Privacy policy
WPA Enterprise
Video surveillance
2. Which of the following is an unauthorized wireless router that allows access to a secure network?
Hierarchical list of critical systems
IPSec
Rogue access point
Initial vector
3. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
content inspection.
NIPS is blocking activities from those specific websites.
Load balancer
Implement a change management strategy
4. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Dumpster diving
Multi-factor authentication.
Use SSH to connect to the Linux shell
Data Encryption Standard (DES)
5. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Humidity
Only the message data is encrypted
Confidentiality - Availability
EMI shielding
6. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Chain of custody
Vulnerability scan
It is used to provide data encryption for WAP connections.
Buffer overflow
7. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
Botnet
Determine the potential monetary costs related to a threat
BIOS
To provide documentation as to who has handled the evidence
8. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Botnet
MD5
DAC
Load balancer
9. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Accountability
Disable unused ports
Implicit deny
Mantraps
10. Which of the following BEST describes the proper method and reason to implement port security?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
S/MIME PGP
It is used to provide data encryption for WAP connections.
Forward to different RDP listening ports.
11. DRPs should contain which of the following?
Hierarchical list of critical systems
Integrity and Authentication
Loop protection
Proxies
12. Which of the following devices would allow a technician to view IP headers on a data packet?
Fiber optic
Protocol analyzer
Power levels
IDS
13. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces
Install a network-based IDS
IPSec
Change Management System
Load balancer
14. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
Vishing
Account disablement
S/MIME PGP
Confidentiality - Availability
15. Upper management decides which risk to mitigate based on cost. This is an example of:
CCTV
Tailgating
quantitative risk assessment
Hardware RAID 5 - Software RAID 1
16. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Only the message data is encrypted
DNS spoofing
Use SSH to connect to the Linux shell
Cross-site scripting
17. Which of the following identifies some of the running services on a system?
Rootkit
Software as a Service (SaaS)
Determine open ports
Initial vector
18. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
Virtual servers have the same information security requirements as physical servers.
Polymorphic
IPSec
AES and TKIP
19. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
Principle of least privilege
WPA2-PSK
BIOS
Privilege escalation
20. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
ICMP
Risk transference
smurf attacks
ARP poisoning
21. Which environmental control is part of TEMPEST compliance?
Bluesnarfing
Shielding
SSH
The new access point was mis-configured and is interfering with another nearby access point.
22. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
To provide documentation as to who has handled the evidence
Hardware RAID 5 - Software RAID 1
MAC
The server is missing the default gateway.
23. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
Dumpster diving - Shoulder surfing
AC filtering - Disabled SSID broadcast
25
TLS
24. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Command injection
Memory - network processes - and system processesserver. If the computer is powered off
Judgment
The user's PC is missing the authentication agent.
25. Which of the following is MOST likely to be the last rule contained on any firewall?
Implicit deny
Cross-site scripting
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Segmentation of each wireless user from other wireless users
26. Which of the following is the default rule found in a corporate firewall's access control list?
Implicit deny
White box
Confidentiality
Deny all
27. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Hardware RAID 5 - Software RAID 1
Shielding
Risk assessmentproduct Answer: D
Enact a policy banning users from bringing in personal music devices.
28. Which of the following is a technique designed to obtain information from a specific person?
Spear phishing
Symmetric
Mantrap
It is used to provide data encryption for WAP connections.
29. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
Blind FTP
Shoulder surfing
NOOP instructions
Baseline reporting
30. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Evil twin
Proxies
Mantrap
The user's PC is missing the authentication agent.
31. Which of the following is the MOST secure method of utilizing FTP?
Change Management System
Accountability
Fault tolerance
FTPS
32. Which of the following is another name for a malicious attacker?
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Black hat
Security guard - Proximity reader
Video surveillance
33. Which solution should you use?
ID badges
SSL
Spam filters
se file servers attached to an NAS system.
34. Which of the following encryption algorithms can be used in PGP for data encryption?
MAC
Physical control of the data
IDEA and TripleDes
Software as a Service
35. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Hot and cold aisles
Algorithm
Clustering
IPv6
36. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?
IPSec
Fiber optic
Evil twin
Install a network-based IDS
37. Which of the following security threats does shredding mitigate?
Dumpster diving
VPN concentrator
extremely slow and numerous antivirus alerts
Software as a Service (SaaS)
38. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
Change Management System
User rights
DNS spoofing
The development team is transferring data to test systems using SFTP and SCP.
39. Which of the following should NOT be used with username/password authentication?
Smurf attack
Cognitive passwords
Data Encryption Standard (DES)
Baseline reporting
40. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
Chain of custody
Vulnerability scan
User rights
The new access point was mis-configured and is interfering with another nearby access point.
41. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. Used in conjunction which of the following are PII?
Firewall - VPN
Birthday - Full name
FTPS
MAC address
43. The 802.11i standard specifies support for which encryption algorithms?
25
AES and TKIP
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Whaling
44. What types of encryption are used for adding a digital signature to a message?
Asymmetric and Hashing
quantitative risk assessment
NOOP instructions
Baseline reporting
45. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
Hot and cold aisles
Trojans
1433
Humidity
46. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
Bluesnarfing
Initial vector
A system that stops an attack in progress.
Clustering
47. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Determine the potential monetary costs related to a threat
Bluesnarfing
Protocol analyzer
Buffer overflow
48. Which of the following uses TCP port 22 by default?
Cognitive passwords
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
The development team is transferring data to test systems using SFTP and SCP.
Integrity
49. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
System A fails open. System B fails closed.
The new access point was mis-configured and is interfering with another nearby access point.
Network Access Control
Enact a policy banning users from bringing in personal music devices.
50. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
DNS spoofing
DAC
Logic Bomb
WPA Enterprise
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests