SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
80 - 443
The user's PC is missing the authentication agent.
Virtual servers have the same information security requirements as physical servers.
Steganography
2. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
IPSec
Detective
80 - 443
IDS
3. Which of the following is specific to a buffer overflow attack?
MAC
Information disclosure
Initial vector
Buffer overflow
4. Which of the following is used when performing a quantitative risk analysis?
Asset value
SSL
It is used to provide data encryption for WAP connections.
22
5. Which of the following BEST describes the proper method and reason to implement port security?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Memory - network processes - and system processesserver. If the computer is powered off
Availability
Fault tolerance
6. Which of the following BEST explains the security benefit of a standardized server image?
Mandated security configurations have been made to the operating system.
Risk transference
Memory - network processes - and system processesserver. If the computer is powered off
Vulnerability scanner
7. Which of the following identifies some of the running services on a system?
Diffie-Hellman
Determine open ports
ACLs
Algorithm
8. Used in conjunction which of the following are PII?
Man-in-the-middle
Birthday - Full name
25
Initial vector
9. Which of the following includes a photo and can be used for identification?
Disable unused ports
CAC
quantitative risk assessment
Rogue access point
10. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
Separation of duties
Information disclosure
Detective
Integrity
11. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
S/MIME PGP
To minimize the organizational risk posed by users
quantitative risk assessment
IDEA and TripleDes
12. Which of the following are the default ports for HTTP and HTTPS protocols?
Content filtering
80 - 443
Organize data based on severity and asset value.
Ensure a proper chain of custody
13. Which environmental control is part of TEMPEST compliance?
Platform as a Service
PEAP-TLS
Shielding
Risk assessmentproduct Answer: D
14. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
VLAN
Mandatory vacation
MAC
Footprinting
15. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
Video surveillance
Use SSH to connect to the Linux shell
ACLs
Vulnerability scan
16. Which of the following devices would allow a technician to view IP headers on a data packet?
Protocol analyzer
IDEA and TripleDes
Check if relaying is denied for unauthorized domains
Off-site backup
17. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
Humidity
Run the image through SHA256. Answer: D
Social Engineering attack
To ensure that staff understands what data they are handling and processing
18. Upper management decides which risk to mitigate based on cost. This is an example of:
Black hat
quantitative risk assessment
Loop protection
PEAP-TLS
19. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
25
Man-in-the-middle
Rootkit
The development team is transferring data to test systems using SFTP and SCP.
20. Which of the following is MOST likely to be the last rule contained on any firewall?
VLAN
Implicit deny
Ensure a proper chain of custody
Hierarchical list of critical systems
21. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
Botnet
Baseline reporting
A worm is self-replicating
S/MIME PGP
22. Which of the following reduces the likelihood of a single point of failure when a server fails?
Steganography
Clustering
Bluesnarfing
Physical control of the data
23. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
By masking the IP address of internal computers from the Internet
extremely slow and numerous antivirus alerts
Provider cloud
Mandatory vacation
24. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
Algorithm
User rights
Smurf attack
Fiber optic
25. A system administrator could have a user level account and an administrator account to prevent:...
Enact a policy banning users from bringing in personal music devices.
escalation of privileges.
WPA2-PSK
80 - 443
26. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
Having the offsite location of tapes also be the hot siteservers
Confidentiality - Availability
Security guard - Proximity reader
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
27. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
System A fails open. System B fails closed.
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
HSM
MAC
28. Which of the following is a reason to perform user awareness and training?
IPSec
To minimize the organizational risk posed by users
Vishing
80 - 443
29. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
Dumpster diving
Run the image through SHA256. Answer: D
TPM
Load balancer
30. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Buffer overflow
Steganography
Implicit deny
Proxies
31. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Visibility - Accessibility - Neighborhood crime rate
Buffer overflow
Firewall - VPN
White box
32. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi
DoS
Principle of least privilege
Vulnerability scanning
Risk transference
33. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
ICMP
Risk transference
TPM
ARP poisoning
34. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
1433
Privilege escalation
Polymorphic
Rogue access point
35. Which of the following attacks would password masking help mitigate?
MAC
Shoulder surfing
Information disclosure
The PC has become part of a botnet.
36. Which of the following access control models allows classification and labeling of objects?
Off-site backup
Spam filters
MAC
Least privilege
37. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
FTPS
The PC has become part of a botnet.
Fault tolerance
Fraud
38. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
To minimize the organizational risk posed by users
quantitative risk assessment
Mandatory vacations
mitigation - acceptance - transference
39. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Pharming - Logic bomb
Spear phishing
DMZ
Hot and cold aisles
40. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Principle of least privilege
User rights
Blind FTP
Proxies
41. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
SSH
Bluesnarfing
Run the image through SHA256. Answer: D
ARP poisoning
42. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
User rights
EMI shielding
Least privilege
Algorithm
43. Which of the following will provide the HIGHEST level of wireless network security?
Business impact analysis
Mandatory vacations
Clean desk policy
WPA2
44. Which of the following should be enabled to ensure only certain wireless clients can access the network?
MAC filtering
Risk assessmentproduct Answer: D
MAC
A worm is self-replicating
45. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
IPSec
Buffer overflow
IPSec
Power levels
46. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
Enact a policy banning users from bringing in personal music devices.
Risk assessmentproduct Answer: D
1433
Baseline reporting
47. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
Separation of duties
ACLs
Fault tolerance
Integrity
48. What is the advantage of using application virtualization?
Lets you minimize the attack surface relating to the application
Check if relaying is denied for unauthorized domains
signing of a user agreement.
1433
49. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Check if relaying is denied for unauthorized domains
Cognitive passwords
Risk transference
Rootkit
50. Which of the following is not an asymmetric system?
FTPS
DES
Buffer overflow
VPN concentrator