SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a Rootkit?
BitLocker
389
1. Confidentiality 2. Integrity 3. Availability
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
2. IPSEC Encryption Modes
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
1. Signatures must be updated 2. Zero day exploits
22
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
3. What is the standard that covers LDAP?
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
1701
X.500 is the standard that covers LDAP
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
4. Can a VLAN provide scalability?
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
Yes a VLAN can provide scalability because it is configured via software not hardware.
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
5. UPS Types
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
X.500 is the standard that covers LDAP
6. What is output validation?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. Telnet port number
23
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
In Windows NT 4 SP4.
8. POP3 port number
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
(2^number of host bits)-2 = number of hosts
110
9. Can a VLAN be used to SEGREGATE access to a DHCP server?
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
67 - 68
1. Something you know2. Something you have 3. Something you are
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
10. PPTP port number
25
1723
Bastion Host
143
11. IDS/IPS Alerts
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
Bastion Host
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
23
12. Symmetric Key Ciphers
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
In Windows NT 4 SP4.
13. Secure Email Protocols
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
49
14. Windows Password Authentication Protocols
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
80
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
15. A web server that is located outside the DMZ is known as a...
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
Use a solution that supports nonrepudiation
Bastion Host
1701
16. Protocols Used for VPN
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
17. Do all hosts on a VLAN have to be connected to the same switch?
119
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
18. What do digital signatures prove?
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
The integrity of a message.
19. Versions of NAT
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
20. Asymmetric Key Ciphers
53
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
BitLocker
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
21. How do you ensure an email comes from the person it advertises as being the sender?
Use a solution that supports nonrepudiation
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
22. What is the name of Vista's hard drive encryption technology?
1. Trust 2. Fear 3. Lack of konwledge
BitLocker
23
C:Windowssystem32driversetcservices
23. The Goals of Security
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
1. Elevation Prompt 2. Privilege Elevation
1. Confidentiality 2. Integrity 3. Availability
53
24. User Account Control (UAC) is an Example of
3389
443
1. Elevation Prompt 2. Privilege Elevation
(2^number of host bits)-2 = number of hosts
25. SMTP port number
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
25
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
26. IMAP port number
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
Are the same thing.
143
119
27. What is a Trojan?
Yes a VLAN can provide scalability because it is configured via software not hardware.
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
28. What is UBE?
Unsolicited Bulk Email or SPAM
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. John the Ripper 2. Cain & Abel 3. THC Hydra
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
29. What formula is used to find the number of hosts?
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
Bastion Host
(2^number of host bits)-2 = number of hosts
30. How could a shared virtual machine reduce the workload for IT staff?
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
80
31. In PKI what is the name of the file that tracks expired certificates?
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
BitLocker
3389
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
32. Password Attacks
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
80
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
33. How does an incremental backup work?
Are the same thing.
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
34. What is PWDUMP?
1. Something you know2. Something you have 3. Something you are
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
35. How does an online/double conversion UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. NNTP port number
The integrity of a message.
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
119
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
37. The 3 Ss
23
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
1. Something you know2. Something you have 3. Something you are
38. Password Crackers
The integrity of a message.
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
1. John the Ripper 2. Cain & Abel 3. THC Hydra
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
39. Remote Desktop port number
3389
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
C:Windowssystem32driversetcservices
40. SSH port number
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
22
Bastion Host
41. What is a Zombie?
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
C:Windowssystem32driversetcservices
42. Can PGP be used to provide nonrepudiation?
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
Unsolicited Bulk Email or SPAM
The integrity of a message.
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
43. Checksums
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
23
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
44. The Primary Causes of Compromised Security
A fast network authentication password cracker that can go after many different services.
80
Bastion Host
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
45. Types of L2TP Tunnels
22
1. Something you know2. Something you have 3. Something you are
In Windows NT 4 SP4.
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
46. In a Windows Doamin - How is a GPO Applied?
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
47. What is THC Hydra?
A fast network authentication password cracker that can go after many different services.
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
110
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
48. How does the MAC model work?
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
67 - 68
1. Something you know2. Something you have 3. Something you are
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
49. Examples of Social Engineering Attacks
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
Bastion Host
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
50. Weaknesses of Antivirus Software
49
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
1. Signatures must be updated 2. Zero day exploits