SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the standard that covers LDAP?
53
X.500 is the standard that covers LDAP
In Windows NT 4 SP4.
67 - 68
2. HTTPS port number
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1. Confidentiality 2. Integrity 3. Availability
443
3. What formula is used to find the number of hosts?
X.500 is the standard that covers LDAP
(2^number of host bits)-2 = number of hosts
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
23
4. In Windows what is the path to the file that contains a list of well-known ports?
The integrity of a message.
1. John the Ripper 2. Cain & Abel 3. THC Hydra
C:Windowssystem32driversetcservices
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
5. Steps in the OVAL Assessment Process
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
25
1. Elevation Prompt 2. Privilege Elevation
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
6. L2TP port number
1701
1. Elevation Prompt 2. Privilege Elevation
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
7. In a Windows Doamin - How is a GPO Applied?
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
C:Windowssystem32driversetcservices
BitLocker
8. Types of L2TP Tunnels
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
Yes a VLAN can provide scalability because it is configured via software not hardware.
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
9. What is a Zombie?
1723
Yes a VLAN can provide scalability because it is configured via software not hardware.
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
In Windows NT 4 SP4.
10. Symmetric Key Ciphers
1. John the Ripper 2. Cain & Abel 3. THC Hydra
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
11. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?
Through the use of digital signatures
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
1701
12. LDAP port number
1. Signatures must be updated 2. Zero day exploits
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
389
Yes a VLAN can provide scalability because it is configured via software not hardware.
13. What is THC Hydra?
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
A fast network authentication password cracker that can go after many different services.
143
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
14. What is PWDUMP?
110
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
49
15. Storage Types
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
110
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
BitLocker
16. Access Control Models
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
17. Can a VLAN be used to SEGREGATE access to a DHCP server?
Through the use of digital signatures
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
23
18. Protocols Used for VPN
Unsolicited Bulk Email or SPAM
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
67 - 68
19. What is a hotfix?
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
143
20. How does an offline UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. Do all hosts on a VLAN have to be connected to the same switch?
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
1723
22. PPTP port number
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
1. Authentication 2. Authorization 3. Accounting
1723
23. Asymmetric Key Ciphers
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1723
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
24. IDS/IPS Alerts
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
In Windows NT 4 SP4.
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
25. TACACS port number
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
49
26. DNS port number
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
53
23
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
27. Telnet port number
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
23
389
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
28. Symmetric Key Ciphers
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
29. The Goals of Security
1. Confidentiality 2. Integrity 3. Availability
1701
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
C:Windowssystem32driversetcservices
30. Remote Desktop port number
80
3389
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
31. IPSEC Encryption Modes
Are the same thing.
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
1. Authentication 2. Authorization 3. Accounting
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
32. Can a VLAN provide scalability?
Are the same thing.
Yes a VLAN can provide scalability because it is configured via software not hardware.
53
80
33. What is the standard that covers PKI?
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
X.509 is the standard that covers PKI
Bastion Host
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
34. What do digital signatures prove?
The integrity of a message.
1723
C:Windowssystem32driversetcservices
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
35. The 3 As
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
1. Authentication 2. Authorization 3. Accounting
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
Use a solution that supports nonrepudiation
36. Types of Firewalls
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
119
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
37. What is a Trojan?
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
119
(2^number of host bits)-2 = number of hosts
38. HTTP port number
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
80
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
C:Windowssystem32driversetcservices
39. Windows Password Authentication Protocols
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
1. Signatures must be updated 2. Zero day exploits
49
40. How do you ensure an email comes from the person it advertises as being the sender?
3389
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
Use a solution that supports nonrepudiation
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
41. When was NTLMv2 first introduced?
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
Unsolicited Bulk Email or SPAM
In Windows NT 4 SP4.
42. How does an incremental backup work?
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
3389
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
43. IMAP port number
143
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
44. NNTP port number
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
119
A fast network authentication password cracker that can go after many different services.
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
45. How could a shared virtual machine reduce the workload for IT staff?
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
46. What is UBE?
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
25
Unsolicited Bulk Email or SPAM
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
47. Goals of Email Security
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
1. John the Ripper 2. Cain & Abel 3. THC Hydra
The integrity of a message.
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
48. How does an online/double conversion UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. User Account Control (UAC) is an Example of
1. Signatures must be updated 2. Zero day exploits
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
119
1. Elevation Prompt 2. Privilege Elevation
50. Examples of Social Engineering Attacks
53
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.