SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
TPM
Privilege escalation
Dumpster diving
Availability
2. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
SSL
Privilege escalation
Cognitive passwords
1433
3. Webmail is classified under which of the following cloud-based technologies?
Dumpster diving
Software as a Service (SaaS)
Network Access Control
se file servers attached to an NAS system.
4. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
Change Management System
Rogue access point
MAC
Data Encryption Standard (DES)
5. Which of the following BEST describes an intrusion prevention system?
Install a network-based IDS
escalation of privileges.
Software as a Service (SaaS)
A system that stops an attack in progress.
6. With which of the following is RAID MOST concerned?
IDS
ACLs
Diffie-Hellman
Availability
7. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Load balancer
Implicit deny
NOOP instructions
Principle of least privilege
8. In which of the following locations would a forensic analyst look to find a hooked process?
Logic Bomb
S/MIME PGP
Protocol analyzer
BIOS
9. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Least privilege
DoS
Vulnerability scanning
Buffer overflow
10. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Decrease the power levels on the WAP
Dumpster diving - Shoulder surfing
Power levels
Video surveillance
11. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
IPSec
Having the offsite location of tapes also be the hot siteservers
25
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
12. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Baseline reporting
Spam filters
Spear phishing
Integrity and Authentication
13. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Video surveillance
Clustering
Firewall rulesflow of network traffic at the edge of the network
DMZ
14. Which of the following is the MAIN reason to require data labeling?
To ensure that staff understands what data they are handling and processing
Integrity and Authentication
IDEA and TripleDes
Chain of custody
15. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
Visibility - Accessibility - Neighborhood crime rate
VLAN segregation
Change Management System
Botnet
16. Which of the following is an unauthorized wireless router that allows access to a secure network?
Implicit deny
IKE
The PC has become part of a botnet.
Rogue access point
17. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
Information disclosure
User rights
Location that meets power and connectivity requirementsdatacenter
SSH
18. A company that purchases insurance to reduce risk is an example of which of the following?
Buffer overflow
Decrease the power levels on the WAP
Risk transference
Vulnerability scanning
19. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?
Implicit deny
User rights
Footprinting
Fiber optic
20. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
IPv6
Whaling
HSM
DNS spoofing
21. What types of encryption are used for adding a digital signature to a message?
Asymmetric and Hashing
Disable unused ports
Shoulder surfing
Vulnerability scanner
22. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
NOOP instructions
S/MIME PGP
Deny all
Spear phishing
23. Which of the following includes a photo and can be used for identification?
CAC
Shielding
Vishing
Baseline reporting
24. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
Rogue access points
User rights
SSH
Block port 23 on the network firewall.
25. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?
Vulnerability scan
Fault tolerance
Vulnerability scanner
System A fails open. System B fails closed.
26. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
The remote router has ICMP blocked.
DMZ
DES
NIPS is blocking activities from those specific websites.
27. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.
Check if relaying is denied for unauthorized domains
Implement a change management strategy
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
EMI shielding
28. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
53
Deny all
Use SSH to connect to the Linux shell
HSM
29. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Hot and cold aisles
Change Management System
Logic Bomb
Rogue access points
30. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Multi-factor authentication.
Visibility - Accessibility - Neighborhood crime rate
FTPS
AC filtering - Disabled SSID broadcast
31. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Protocol analyzer
The remote router has ICMP blocked.
Vulnerability scan
Validate input to remove hypertext
32. You are performing risk assessment for an organization. What should you do during impact assessment?
Install a network-based IDS
Determine the potential monetary costs related to a threat
IDEA and TripleDes
Confidentiality - Availability
33. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
Privilege escalation
White box
Whaling
Data Encryption Standard (DES)
34. Which of the following functions is MOST likely performed by a web security gateway?
Implicit deny
PEAP-TLS
Content filtering
Vulnerability scanner
35. Which of the following risks may result from improper use of social networking and P2P software?
AC filtering - Disabled SSID broadcast
Hot and cold aisles
SSL
Information disclosure
36. Which of the following is the BEST choice for encryption on a wireless network?
Integrity
Hierarchical list of critical systems
WPA2-PSK
DAC
37. A system administrator could have a user level account and an administrator account to prevent:...
Only the message data is encrypted
quantitative risk assessment
DMZ
escalation of privileges.
38. Which of the following is a detective security control?
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
CCTV
Change Management System
Judgment
39. Which of the following is true concerning email message encryption by using S/MIME?
IKE
VLAN segregation
IDEA and TripleDes
Only the message data is encrypted
40. Which of the following access control models allows classification and labeling of objects?
DAC
User rights
Smurf attack
MAC
41. Risk can be managed in the following ways...
Least privilege
Bluesnarfing
DoS
mitigation - acceptance - transference
42. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
IPSec
Spam filters
Steganography
Rogue access points
43. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?
NOOP instructions
Platform as a Service
Rogue access points
Disable unused ports
44. Which environmental control is part of TEMPEST compliance?
Proxies
Shielding
The user's PC is missing the authentication agent.
A worm is self-replicating
45. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Before and after the imaging process and then hash the forensic image
The development team is transferring data to test systems using SFTP and SCP.
Implement a change management strategy
Footprinting
46. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Data Encryption Standard (DES)
Pharming - Logic bomb
Initial vector
Smurf attack
47. What are typical elements of authentication as part of physical access controls?
Buffer overflow
To provide documentation as to who has handled the evidence
Fiber optic
ID badges
48. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Location that meets power and connectivity requirementsdatacenter
Platform as a Service
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Mandatory vacation
49. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Proxies
Disable unused ports
mitigation - acceptance - transference
Confidentiality - Availability
50. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
Memory - network processes - and system processesserver. If the computer is powered off
Baseline reporting
WPA2
Buffer overflow