SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How could a shared virtual machine reduce the workload for IT staff?
25
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
1. Elevation Prompt 2. Privilege Elevation
2. What is the name of Vista's hard drive encryption technology?
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
The integrity of a message.
BitLocker
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
3. How does an offline UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. The Primary Causes of Compromised Security
BitLocker
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. Trust 2. Fear 3. Lack of konwledge
5. Windows Password Authentication Protocols
110
1701
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
389
6. IPSEC Encryption Modes
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
1723
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
7. TACACS port number
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
49
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
8. Can a VLAN provide scalability?
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
Yes a VLAN can provide scalability because it is configured via software not hardware.
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
Are the same thing.
9. Password Crackers
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. John the Ripper 2. Cain & Abel 3. THC Hydra
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
10. How does a differential backup work?
Bastion Host
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
11. Can PGP be used to provide nonrepudiation?
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
12. Symmetric Key Ciphers
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
X.509 is the standard that covers PKI
143
119
13. How does the MAC model work?
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
143
Are the same thing.
49
14. IMAP port number
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
143
1701
15. User Account Control (UAC) is an Example of
X.500 is the standard that covers LDAP
1. Elevation Prompt 2. Privilege Elevation
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
80
16. When was NTLMv2 first introduced?
49
In Windows NT 4 SP4.
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
Through the use of digital signatures
17. Goals of Email Security
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
Bastion Host
18. LDAP port number
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
389
1723
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
19. How do you ensure an email comes from the person it advertises as being the sender?
443
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
Use a solution that supports nonrepudiation
20. Secure Email Protocols
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
143
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
21. Password Attacks
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
C:Windowssystem32driversetcservices
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
22. Steps in the OVAL Assessment Process
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
X.500 is the standard that covers LDAP
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
1. John the Ripper 2. Cain & Abel 3. THC Hydra
23. Access Control Models
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
X.509 is the standard that covers PKI
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
24. A web server that is located outside the DMZ is known as a...
389
1. John the Ripper 2. Cain & Abel 3. THC Hydra
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
Bastion Host
25. UPS Types
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
23
Yes a VLAN can provide scalability because it is configured via software not hardware.
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
26. Weaknesses of Antivirus Software
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. Signatures must be updated 2. Zero day exploits
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
389
27. Storage Types
X.500 is the standard that covers LDAP
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
119
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
28. Does PGP rely on X.509 (Digital Certificates - PKI)?
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
80
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
The integrity of a message.
29. NNTP port number
Are the same thing.
119
Bastion Host
The integrity of a message.
30. What is a Trojan?
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
80
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
31. What formula is used to find the number of hosts?
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
1701
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
(2^number of host bits)-2 = number of hosts
32. Versions of NAT
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
33. HTTP port number
Bastion Host
80
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
3389
34. What is PWDUMP?
BitLocker
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
C:Windowssystem32driversetcservices
(2^number of host bits)-2 = number of hosts
35. Telnet port number
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
Yes a VLAN can provide scalability because it is configured via software not hardware.
23
36. Protocols Used for VPN
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
Unsolicited Bulk Email or SPAM
37. How does an incremental backup work?
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
Unsolicited Bulk Email or SPAM
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
38. Human Behaviors that Social Engineering Will Exploit
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
1. Trust 2. Fear 3. Lack of konwledge
Yes a VLAN can provide scalability because it is configured via software not hardware.
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
39. What is a hotfix?
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. Trust 2. Fear 3. Lack of konwledge
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
40. What is UBE?
Unsolicited Bulk Email or SPAM
143
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
(2^number of host bits)-2 = number of hosts
41. How can you identify a SQL Injection attack?
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
25
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
42. What is the SLE (Single Loss Expectancy)?
1723
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
A fast network authentication password cracker that can go after many different services.
43. Remote Desktop port number
143
3389
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
(2^number of host bits)-2 = number of hosts
44. What do digital signatures prove?
(2^number of host bits)-2 = number of hosts
The integrity of a message.
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
45. What is the difference between an online UPS and a double conversion UPS?
1. Signatures must be updated 2. Zero day exploits
Are the same thing.
443
1. Elevation Prompt 2. Privilege Elevation
46. In PKI what is the name of the file that tracks expired certificates?
Are the same thing.
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
25
47. What is the standard that covers PKI?
The integrity of a message.
119
X.509 is the standard that covers PKI
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
48. Types of Firewalls
1. Signatures must be updated 2. Zero day exploits
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
The integrity of a message.
49. Do all hosts on a VLAN have to be connected to the same switch?
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
BitLocker
50. The 3 Ss
1. Something you know2. Something you have 3. Something you are
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. Authentication 2. Authorization 3. Accounting
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.