SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
White box
Vulnerability scan
Account disablement
Phishing techniques
2. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
Install a network-based IDS
Fault tolerance
Spear phishing
War driving
3. What allows for all activities on a network or system to be traced to the user who performed them?
PEAP-TLS
War driving
Implicit deny
Accountability
4. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
Blind FTP
It is used to provide data encryption for WAP connections.
The development team is transferring data to test systems using SFTP and SCP.
WPA2-PSK
5. Webmail is classified under which of the following cloud-based technologies?
Trojans
Principle of least privilege
1433
Software as a Service (SaaS)
6. Which of the following is a best practice when securing a switch from physical access?
Humidity
Disable unused ports
Separation of duties
Platform as a Service
7. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
Polymorphic
IPSec
Provider cloud
Proxies
8. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
CCTV
SSL
VLAN
Smurf attack
9. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
AC filtering - Disabled SSID broadcast
Asset value
Buffer overflow
Risk assessmentproduct Answer: D
10. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
S/MIME PGP
Protocol analyzer
Implicit deny
Initial vector
11. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
Baseline reporting
PEAP-TLS
TPM
Change Management System
12. Which of the following should NOT be used with username/password authentication?
Smurf attack
Organize data based on severity and asset value.
Cognitive passwords
Judgment
13. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
VLAN segregation
Symmetric Key
se file servers attached to an NAS system.
Protocol analyzer
14. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
DoS
War driving
SYN attacks
Mandatory vacation
15. On-going annual awareness security training should be coupled with:..
Black hat
mitigation - acceptance - transference
signing of a user agreement.
Algorithm
16. Which of the following uses TCP port 22 by default?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Deny all
HSM
Cross-site scripting
17. Which environmental control is part of TEMPEST compliance?
Shielding
FTPS
Platform as a Service
Buffer overflow
18. Isolation mode on an AP provides which of the following functionality types?
Disable unused ports
Protocol analyzer
Implicit deny
Segmentation of each wireless user from other wireless users
19. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
User rights and permissions reviews
Risk assessmentproduct Answer: D
Configure the IE popup blockers
CCTV
20. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
MS-CHAP
Risk transference
MD5
To provide documentation as to who has handled the evidence
21. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Clustering
Dumpster diving - Shoulder surfing
Having the offsite location of tapes also be the hot siteservers
Enact a policy banning users from bringing in personal music devices.
22. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
Spam filters
VLAN segregation
DNS spoofing
Buffer overflow
23. Which of the following is MOST likely to be the last rule contained on any firewall?
Implicit deny
WPA2
extremely slow and numerous antivirus alerts
content inspection.
24. Which of the following is the BEST choice for encryption on a wireless network?
Security guard - Proximity reader
Cross-site scripting
Trojans
WPA2-PSK
25. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
MAC
Tailgating
ARP poisoning
Mandatory vacations
26. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
The remote router has ICMP blocked.
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Security guard - Proximity reader
NOOP instructions
27. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
SSL
War driving
Botnet
28. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
Command injection
Decrease the power levels on the WAP
To minimize the organizational risk posed by users
TCP SYN flood attack
29. Which of the following protocols requires the use of a CA based authentication process?
Principle of least privilege
Cross-site scripting
Spear phishing
PEAP-TLS
30. Which of the following encryption algorithms can be used in PGP for data encryption?
Risk assessmentproduct Answer: D
Software as a Service
1433
IDEA and TripleDes
31. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
Diffie-Hellman
AC filtering - Disabled SSID broadcast
Baseline reporting
Trojans
32. Which of the following is NOT an application layer security protocol?
IDS
Accountability
content inspection.
IPSec
33. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
The PC has become part of a botnet.
Principle of least privilege
Rootkit
DAC
34. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
Proxies
Humidity
The server is missing the default gateway.
VLAN segregation
35. Which of the following is the BEST way to secure data for the purpose of retention?
Whaling
Forward to different RDP listening ports.
Off-site backup
EMI shielding
36. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Firewall rulesflow of network traffic at the edge of the network
Trojans
Dumpster diving - Shoulder surfing
Physical control of the data
37. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Tailgating
Confidentiality
Firewall - VPN
Diffie-Hellman
38. Which of the following logical controls does a flood guard protect against?
Asset value
SYN attacks
TLS
DES
39. Which of the following assists in identifying if a system was properly handled during transport?
Asymmetric and Hashing
Whaling
Chain of custody
IPSec
40. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
To minimize the organizational risk posed by users
Humidity
ACLs
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
41. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
CCTV
IDS
Detective
Mandatory vacation
42. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
Memory - network processes - and system processesserver. If the computer is powered off
DoS
Separation of duties
Shoulder surfing
43. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
Clustering
Platform as a Service
Fault tolerance
1433
44. What asymmetric key is used to decrypt when using HTTPS?
45. MAC filtering is a form of which of the following?
mitigation - acceptance - transference
Content filtering
NIDS
Network Access Control
46. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Logic Bomb
Least privilege
The server is missing the default gateway.
Mandated security configurations have been made to the operating system.
47. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Deny all
Footprinting
Mantrap
Gas
48. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Only the message data is encrypted
Hot and cold aisles
Before and after the imaging process and then hash the forensic image
Configure the IE popup blockers
49. Which of the following is not an asymmetric system?
Diffie-Hellman
Fraud
User rights and permissions reviews
DES
50. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Spear phishing
Software as a Service
DES
Vulnerability scan