SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IPSEC Encryption Modes
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
1723
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
2. DHCP port number
(2^number of host bits)-2 = number of hosts
67 - 68
110
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
3. What is THC Hydra?
3389
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
A fast network authentication password cracker that can go after many different services.
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
4. PPTP port number
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
1723
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
5. When was NTLMv2 first introduced?
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
(2^number of host bits)-2 = number of hosts
In Windows NT 4 SP4.
22
6. Can a VLAN be used to SEGREGATE access to a DHCP server?
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
Unsolicited Bulk Email or SPAM
7. How could a shared virtual machine reduce the workload for IT staff?
X.500 is the standard that covers LDAP
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
Through the use of digital signatures
8. HTTPS port number
1. Signatures must be updated 2. Zero day exploits
443
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
9. Secure Email Protocols
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
3389
Bastion Host
10. LDAP port number
1. Trust 2. Fear 3. Lack of konwledge
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
389
1. Something you know2. Something you have 3. Something you are
11. Remote Desktop port number
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
X.500 is the standard that covers LDAP
3389
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
12. Steps in the OVAL Assessment Process
3389
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
13. What is a Zombie?
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
53
14. How can you identify a SQL Injection attack?
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
A fast network authentication password cracker that can go after many different services.
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
15. Can a VLAN provide scalability?
Yes a VLAN can provide scalability because it is configured via software not hardware.
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
A fast network authentication password cracker that can go after many different services.
The integrity of a message.
16. DNS port number
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
53
1. John the Ripper 2. Cain & Abel 3. THC Hydra
17. The Primary Causes of Compromised Security
49
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
67 - 68
18. In PKI what is the name of the file that tracks expired certificates?
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
1723
19. Symmetric Key Ciphers
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
Are the same thing.
20. A web server that is located outside the DMZ is known as a...
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
119
Bastion Host
21. How does an incremental backup work?
1701
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
22. TACACS port number
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
49
22
Bastion Host
23. What is a hotfix?
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
24. What is output validation?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. Windows Password Authentication Protocols
Unsolicited Bulk Email or SPAM
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
26. In Windows what is the path to the file that contains a list of well-known ports?
1. Trust 2. Fear 3. Lack of konwledge
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
C:Windowssystem32driversetcservices
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
27. Human Behaviors that Social Engineering Will Exploit
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
80
BitLocker
1. Trust 2. Fear 3. Lack of konwledge
28. Goals of Email Security
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
49
29. In a Windows Doamin - How is a GPO Applied?
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
80
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
30. How does the MAC model work?
BitLocker
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
X.500 is the standard that covers LDAP
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
31. How does an online/double conversion UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. Versions of NAT
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
143
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
49
33. Telnet port number
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
23
A fast network authentication password cracker that can go after many different services.
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
34. IMAP port number
143
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
443
35. Types of Firewalls
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
1. Authentication 2. Authorization 3. Accounting
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
36. Checksums
389
22
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
Through the use of digital signatures
37. Access Control Models
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
143
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
22
38. HTTP port number
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
In Windows NT 4 SP4.
80
39. Does PGP rely on X.509 (Digital Certificates - PKI)?
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
Are the same thing.
40. Password Crackers
1. John the Ripper 2. Cain & Abel 3. THC Hydra
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
Unsolicited Bulk Email or SPAM
C:Windowssystem32driversetcservices
41. UPS Types
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
42. Weaknesses of Antivirus Software
1. Authentication 2. Authorization 3. Accounting
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
1. Signatures must be updated 2. Zero day exploits
43. What is the standard that covers LDAP?
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
119
X.509 is the standard that covers PKI
X.500 is the standard that covers LDAP
44. Symmetric Key Ciphers
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
110
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
45. Protocols Used for VPN
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
46. Types of L2TP Tunnels
443
1. Something you know2. Something you have 3. Something you are
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
The integrity of a message.
47. How do you ensure an email comes from the person it advertises as being the sender?
Unsolicited Bulk Email or SPAM
23
1. Confidentiality 2. Integrity 3. Availability
Use a solution that supports nonrepudiation
48. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
1723
Through the use of digital signatures
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
49. The 3 As
1. Authentication 2. Authorization 3. Accounting
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
50. IDS/IPS Alerts
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
A fast network authentication password cracker that can go after many different services.