SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What formula is used to find the number of hosts?
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
(2^number of host bits)-2 = number of hosts
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
2. Types of Firewalls
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
Bastion Host
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
3. Password Crackers
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
1. Trust 2. Fear 3. Lack of konwledge
1. John the Ripper 2. Cain & Abel 3. THC Hydra
4. What is UBE?
Unsolicited Bulk Email or SPAM
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
80
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
5. Checksums
110
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
6. HTTPS port number
443
(2^number of host bits)-2 = number of hosts
22
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
7. Asymmetric Key Ciphers
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
8. When was NTLMv2 first introduced?
In Windows NT 4 SP4.
23
1701
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
9. Telnet port number
23
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
X.500 is the standard that covers LDAP
3389
10. The Goals of Security
1. Confidentiality 2. Integrity 3. Availability
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
49
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
11. The 3 Ss
1. Something you know2. Something you have 3. Something you are
1. John the Ripper 2. Cain & Abel 3. THC Hydra
1. Signatures must be updated 2. Zero day exploits
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
12. Asymmetric Key Ciphers
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
Bastion Host
X.509 is the standard that covers PKI
13. What is a hotfix?
3389
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
389
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
14. Symmetric Key Ciphers
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
Through the use of digital signatures
15. SMTP port number
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
25
1701
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
16. Can a VLAN be used to SEGREGATE access to a DHCP server?
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
1701
Through the use of digital signatures
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
17. What is the standard that covers PKI?
Yes a VLAN can provide scalability because it is configured via software not hardware.
1701
389
X.509 is the standard that covers PKI
18. What is a Rootkit?
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
X.509 is the standard that covers PKI
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
143
19. How does an offline UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. HTTP port number
X.509 is the standard that covers PKI
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
Bastion Host
80
21. Password Attacks
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. Trust 2. Fear 3. Lack of konwledge
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
22. Weaknesses of Antivirus Software
Are the same thing.
1. Signatures must be updated 2. Zero day exploits
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
23. User Account Control (UAC) is an Example of
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
1. Elevation Prompt 2. Privilege Elevation
110
1701
24. Ways to Secure a WiFi Access Point
67 - 68
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
25. DHCP port number
1. Signatures must be updated 2. Zero day exploits
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
67 - 68
3389
26. How does an online/double conversion UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. The Primary Causes of Compromised Security
443
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
28. Human Behaviors that Social Engineering Will Exploit
1. Trust 2. Fear 3. Lack of konwledge
1. Authentication 2. Authorization 3. Accounting
80
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
29. How does a differential backup work?
1. Confidentiality 2. Integrity 3. Availability
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
1. John the Ripper 2. Cain & Abel 3. THC Hydra
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
30. The 3 As
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
1. Authentication 2. Authorization 3. Accounting
31. PPTP port number
110
X.509 is the standard that covers PKI
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
1723
32. Versions of NAT
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
33. In Windows what is the path to the file that contains a list of well-known ports?
1. John the Ripper 2. Cain & Abel 3. THC Hydra
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
C:Windowssystem32driversetcservices
1. Authentication 2. Authorization 3. Accounting
34. NNTP port number
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
119
1. Elevation Prompt 2. Privilege Elevation
C:Windowssystem32driversetcservices
35. Steps in the OVAL Assessment Process
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
36. What is a Zombie?
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
C:Windowssystem32driversetcservices
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
37. Remote Desktop port number
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
3389
143
38. How could a shared virtual machine reduce the workload for IT staff?
BitLocker
Use a solution that supports nonrepudiation
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
39. IPSEC Encryption Modes
22
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
40. Do all hosts on a VLAN have to be connected to the same switch?
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
Use a solution that supports nonrepudiation
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
41. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?
Bastion Host
Unsolicited Bulk Email or SPAM
25
Through the use of digital signatures
42. What is output validation?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. Windows Password Authentication Protocols
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
80
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
44. How do you ensure an email comes from the person it advertises as being the sender?
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
Use a solution that supports nonrepudiation
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
45. SSH port number
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
22
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
46. Examples of Social Engineering Attacks
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
Yes a VLAN can provide scalability because it is configured via software not hardware.
47. What is PWDUMP?
443
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
C:Windowssystem32driversetcservices
48. What is the name of Vista's hard drive encryption technology?
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
49
BitLocker
110
49. In PKI what is the name of the file that tracks expired certificates?
X.509 is the standard that covers PKI
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
50. Can a VLAN provide scalability?
Through the use of digital signatures
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
Yes a VLAN can provide scalability because it is configured via software not hardware.