SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Diffie-Hellman
Enact a policy banning users from bringing in personal music devices.
Add input validation to forms.
Dumpster diving - Shoulder surfing
2. Which of the following encryption algorithms can be used in PGP for data encryption?
IDEA and TripleDes
MAC filtering
Social Engineering attack
Buffer overflow
3. Which of the following is used when performing a qualitative risk analysis?
WPA Enterprise
ACLs
Judgment
IPSec
4. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Disable unused ports
Dumpster diving - Shoulder surfing
Implicit deny
signing of a user agreement.
5. Which of the following is a security control that is lost when using cloud computing?
Fraud
Physical control of the data
Trojans
VLAN
6. Which of the following BEST describes the proper method and reason to implement port security?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Steganography
Fraud
Symmetric Key
7. Which of the following is a method to prevent ad-hoc configuration mistakes?
Social Engineering attack
Implement a change management strategy
NIPS is blocking activities from those specific websites.
Use SSH to connect to the Linux shell
8. Which of the following will provide the HIGHEST level of wireless network security?
ACLs
Rogue access points
WPA2
Install a network-based IDS
9. Which of the following port numbers is used for SCP by default?
Validate input to remove hypertext
22
War driving
Account disablement
10. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
EMI shielding
Smurf attack
Vulnerability scan
Configure the IE popup blockers
11. Which of the following is a best practice when securing a switch from physical access?
WPA2-PSK
User rights
IDS
Disable unused ports
12. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Run the image through SHA256. Answer: D
25
Logic Bomb
Algorithm
13. Which of the following protocols requires the use of a CA based authentication process?
PEAP-TLS
The web site's private key.
User rights
Blind FTP
14. Which of the following devices would allow a technician to view IP headers on a data packet?
Trojans
Protocol analyzer
BIOS
Network Access Control
15. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Load balancer
Vulnerability scan
Mandated security configurations have been made to the operating system.
Privacy policy
16. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
Privilege escalation
IDS
ACLs
ARP poisoning
17. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Birthday - Full name
smurf attacks
Power levels
User rights and permissions reviews
18. Which of the following logical controls does a flood guard protect against?
Loop protection
To provide documentation as to who has handled the evidence
SYN attacks
Business impact analysis
19. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
IPv6
Integrity
Fraud
The server is missing the default gateway.
20. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Rootkit
25
Mandated security configurations have been made to the operating system.
Cross-site scripting
21. Which of the following is used when performing a quantitative risk analysis?
Video surveillance
Chain of custody
White box
Asset value
22. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m
The new access point was mis-configured and is interfering with another nearby access point.
MS-CHAP
Fault tolerance
quantitative risk assessment
23. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?
Software as a Service (SaaS)
A worm is self-replicating
Enact a policy banning users from bringing in personal music devices.
Loop protection
24. Which of the following environmental variables reduces the potential for static discharges?
SNMP (also use to monitor the parameters of network devices)
Fiber optic
Humidity
Asymmetric and Hashing
25. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
Shoulder surfing
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Forward to different RDP listening ports.
Baseline reporting
26. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
Network Access Control
Determine open ports
Baseline reporting
AC filtering - Disabled SSID broadcast
27. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Privilege escalation
IDS
Dumpster diving
Diffie-Hellman
28. Separating of duties is valuable in deterring?
Fraud
content inspection.
Software as a Service (SaaS)
Asset value
29. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Use SSH to connect to the Linux shell
Spear phishing
Visibility - Accessibility - Neighborhood crime rate
Principle of least privilege
30. Which of the following includes a photo and can be used for identification?
CAC
PEAP-TLS
AC filtering - Disabled SSID broadcast
Confidentiality - Availability
31. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Run the image through SHA256. Answer: D
Hardware RAID 5 - Software RAID 1
Fault tolerance
Power levels
32. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. Which of the following is MOST commonly a part of routine system audits?
VLAN
Network Access Control
User rights and permissions reviews
Spam filters
34. Which of the following is another name for a malicious attacker?
Black hat
TPM
MAC
Ensure a proper chain of custody
35. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
extremely slow and numerous antivirus alerts
Determine open ports
SSH
Initial vector
36. Which of the following manages peer authentication and key exchange for an IPSec connection?
Check if relaying is denied for unauthorized domains
IKE
ICMP
To minimize the organizational risk posed by users
37. Which of the following can prevent an unauthorized employee from entering a data center?
Security guard - Proximity reader
TLS
Platform as a Service
Loop protection
38. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
IPSec
53
DNS spoofing
Black hat
39. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
The PC has become part of a botnet.
Vulnerability scanning
Network Access Control
Software as a Service (SaaS)
40. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
To ensure that staff understands what data they are handling and processing
Footprinting
MS-CHAP
Confidentiality
41. Which of the following is a technique designed to obtain information from a specific person?
A worm is self-replicating
Physical control of the data
Confidentiality - Availability
Spear phishing
42. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
Vulnerability scan
Cross-site scripting
Virtual servers have the same information security requirements as physical servers.
Ensure a proper chain of custody
43. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
Social Engineering attack
Deny all
IPSec
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
44. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?
By masking the IP address of internal computers from the Internet
Platform as a Service
25
To ensure that staff understands what data they are handling and processing
45. MAC filtering is a form of which of the following?
VPN concentrator
To provide documentation as to who has handled the evidence
Network Access Control
ACLs
46. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
Disable unused ports
IPSec
Vulnerability scan
White box
47. Webmail is classified under which of the following cloud-based technologies?
Evil twin
Trojans
Software as a Service (SaaS)
Vulnerability scan
48. Which of the following is the MAIN reason to require data labeling?
The user's PC is missing the authentication agent.
Network Access Control
To ensure that staff understands what data they are handling and processing
CCTV
49. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
Mandatory vacations
Logic Bomb
Bluesnarfing
Fault tolerance
50. Which of the following describes a passive attempt to identify weaknesses?
Vulnerability scanning
War driving
Memory - network processes - and system processesserver. If the computer is powered off
Fraud