SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
Risk assessmentproduct Answer: D
Algorithm
MAC
To provide documentation as to who has handled the evidence
2. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
CCTV
The web site's public key.
Dumpster diving - Shoulder surfing
22
3. Which of the following identifies some of the running services on a system?
Determine open ports
Spam filters
signing of a user agreement.
TCP SYN flood attack
4. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
To minimize the organizational risk posed by users
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Forward to different RDP listening ports.
User rights
5. Which of the following describes when forensic hashing should occur on a drive?
Algorithm
Mantrap
Before and after the imaging process and then hash the forensic image
Load balancer
6. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Confidentiality - Availability
80 - 443
WPA Enterprise
Protocol analyzer
7. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
PEAP-TLS
Proxies
DMZ
Confidentiality - Availability
8. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Diffie-Hellman
Vishing
Fiber optic
9. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?
quantitative risk assessment
Mandatory vacation
Spear phishing
Decrease the power levels on the WAP
10. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?
Fault tolerance
1433
The PC has become part of a botnet.
WPA Enterprise
11. With which of the following is RAID MOST concerned?
IDS
25
Install a network-based IDS
Availability
12. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
DoS
EMI shielding
content inspection.
IDEA and TripleDes
13. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Mantraps
Evil twin
CCTV
Footprinting
14. Which of the following protocols requires the use of a CA based authentication process?
ACLs
Add input validation to forms.
PEAP-TLS
TPM
15. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?
Loop protection
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
80 - 443
Phishing techniques
16. Which solution should you use?
se file servers attached to an NAS system.
BIOS
Smurf attack
PEAP-TLS
17. Isolation mode on an AP provides which of the following functionality types?
The remote router has ICMP blocked.
Organize data based on severity and asset value.
The web site's public key.
Segmentation of each wireless user from other wireless users
18. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Power levels
Hot and cold aisles
Whaling
MAC
19. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Confidentiality
WPA2
Load balancer
Steganography
20. Which of the following is used when performing a qualitative risk analysis?
PEAP-TLS
Judgment
Fiber optic
Only the message data is encrypted
21. Actively monitoring data streams in search of malicious code or behavior is an example of..
content inspection.
Asset value
Mantrap
Botnet
22. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
Least privilege
HSM
Vulnerability scanner
Baseline reporting
23. Separating of duties is valuable in deterring?
se file servers attached to an NAS system.
War driving
Fraud
Ensure a proper chain of custody
24. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
Mandated security configurations have been made to the operating system.
Steganography
Change Management System
Data Encryption Standard (DES)
25. Which of the following is true regarding the WTLS protocol?
Fault tolerance
Deny all
It is used to provide data encryption for WAP connections.
BIOS
26. Which of the following is the primary difference between a virus and a worm?
A worm is self-replicating
NIPS is blocking activities from those specific websites.
Confidentiality
Virtual servers have the same information security requirements as physical servers.
27. Which of the following is used for exchanging secret keys over an insecure public network?
A worm is self-replicating
Baseline reporting
Diffie-Hellman
DAC
28. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
A worm is self-replicating
Cognitive passwords
Location that meets power and connectivity requirementsdatacenter
Principle of least privilege
29. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?
Fiber optic
Vishing
User rights and permissions reviews
ID badges
30. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
System A fails open. System B fails closed.
Baseline reporting
IPSec
53
31. Which of the following is a method to prevent ad-hoc configuration mistakes?
TPM
Humidity
Steganography
Implement a change management strategy
32. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Enact a policy banning users from bringing in personal music devices.
Account disablement
Shielding
Vishing
33. Which of the following is used when performing a quantitative risk analysis?
Mantraps
Asset value
Integrity and Authentication
MAC address
34. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
ICMP
NOOP instructions
Privilege escalation
Vulnerability scan
35. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
ICMP
Fiber optic
Privacy policy
Multi-factor authentication.
36. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
Physical control of the data
Diffie-Hellman
SYN attacks
VLAN segregation
37. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
The web site's public key.
Footprinting
Validate input to remove hypertext
extremely slow and numerous antivirus alerts
38. NIDS can also be used to help identify...
IKE
IPSec
smurf attacks
To provide documentation as to who has handled the evidence
39. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
The remote router has ICMP blocked.
IPSec
Content filtering
VLAN
40. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Spear phishing
MD5
The web site's private key.
Decrease the power levels on the WAP
41. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
Buffer overflow
By masking the IP address of internal computers from the Internet
Physical control of the data
System A fails open. System B fails closed.
42. Which of the following uses TCP port 22 by default?
IPSec
Principle of least privilege
Dumpster diving - Shoulder surfing
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
43. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
MAC
By masking the IP address of internal computers from the Internet
TPM
Implicit deny
44. Which of the following is the BEST way to secure data for the purpose of retention?
Forward to different RDP listening ports.
VLAN segregation
Off-site backup
Firewall rulesflow of network traffic at the edge of the network
45. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
Organize data based on severity and asset value.
Configure the IE popup blockers
smurf attacks
Vulnerability scanning
46. Which of the following BEST explains the security benefit of a standardized server image?
Proxies
Mandated security configurations have been made to the operating system.
Implicit deny
ARP poisoning
47. Which of the following should be performed on a computer to protect the operating system from malicious software?
Disable unused services - Update HIPS signatures
1433
ARP poisoning
se file servers attached to an NAS system.
48. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
MAC filtering
Mantraps
Visibility - Accessibility - Neighborhood crime rate
Proxies
49. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
50. Which of the following would need to be configured correctly to allow remote access to the network?
IPSec
Forward to different RDP listening ports.
ACLs
Polymorphic