SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. LDAP port number
143
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
Use a solution that supports nonrepudiation
389
2. What is a Zombie?
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
C:Windowssystem32driversetcservices
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
3. Versions of NAT
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
22
4. Do all hosts on a VLAN have to be connected to the same switch?
67 - 68
3389
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
443
5. PPTP port number
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1723
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
6. HTTPS port number
443
67 - 68
Yes a VLAN can provide scalability because it is configured via software not hardware.
Unsolicited Bulk Email or SPAM
7. What is the SLE (Single Loss Expectancy)?
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
143
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
8. Remote Desktop port number
3389
1. Trust 2. Fear 3. Lack of konwledge
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
53
9. The 3 Ss
25
In Windows NT 4 SP4.
1. Something you know2. Something you have 3. Something you are
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
10. DNS port number
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
53
80
11. Goals of Email Security
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
BitLocker
80
12. What is UBE?
Unsolicited Bulk Email or SPAM
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
X.509 is the standard that covers PKI
13. What is the standard that covers PKI?
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
67 - 68
X.509 is the standard that covers PKI
14. Symmetric Key Ciphers
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
3389
Unsolicited Bulk Email or SPAM
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
15. IDS/IPS Alerts
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
1723
16. Can a VLAN be used to SEGREGATE access to a DHCP server?
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
17. Windows Password Authentication Protocols
C:Windowssystem32driversetcservices
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
(2^number of host bits)-2 = number of hosts
18. How does the MAC model work?
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
19. Asymmetric Key Ciphers
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
3389
20. What is output validation?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. Ways to Secure a WiFi Access Point
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
The integrity of a message.
22. IMAP port number
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
1723
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
143
23. Access Control Models
Bastion Host
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
24. What is a hotfix?
110
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
3389
25. Types of Firewalls
25
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
26. When was NTLMv2 first introduced?
22
In Windows NT 4 SP4.
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
53
27. Password Attacks
In Windows NT 4 SP4.
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
Unsolicited Bulk Email or SPAM
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
28. SSH port number
22
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
Are the same thing.
29. How can you identify a SQL Injection attack?
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
BitLocker
80
30. IPSEC Encryption Modes
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
(2^number of host bits)-2 = number of hosts
31. Human Behaviors that Social Engineering Will Exploit
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
Bastion Host
1. Trust 2. Fear 3. Lack of konwledge
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
32. NNTP port number
1. Elevation Prompt 2. Privilege Elevation
67 - 68
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
119
33. What is the difference between an online UPS and a double conversion UPS?
1701
1723
Are the same thing.
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
34. How do you ensure an email comes from the person it advertises as being the sender?
Yes a VLAN can provide scalability because it is configured via software not hardware.
3389
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
Use a solution that supports nonrepudiation
35. What do digital signatures prove?
The integrity of a message.
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
Yes a VLAN can provide scalability because it is configured via software not hardware.
36. Types of L2TP Tunnels
Yes a VLAN can provide scalability because it is configured via software not hardware.
(2^number of host bits)-2 = number of hosts
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
23
37. What is PWDUMP?
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
53
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
119
38. Storage Types
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
49
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
In Windows NT 4 SP4.
39. Symmetric Key Ciphers
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
40. How does an online/double conversion UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. The Goals of Security
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
1. Confidentiality 2. Integrity 3. Availability
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
1. John the Ripper 2. Cain & Abel 3. THC Hydra
42. Steps in the OVAL Assessment Process
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
1. Trust 2. Fear 3. Lack of konwledge
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
43. How could a shared virtual machine reduce the workload for IT staff?
49
(2^number of host bits)-2 = number of hosts
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
44. What is the name of Vista's hard drive encryption technology?
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
BitLocker
1. Something you know2. Something you have 3. Something you are
45. HTTP port number
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
80
3389
1. John the Ripper 2. Cain & Abel 3. THC Hydra
46. What is a Rootkit?
49
119
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
47. POP3 port number
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
110
1. Trust 2. Fear 3. Lack of konwledge
48. Secure Email Protocols
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
Bastion Host
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
49. In Windows what is the path to the file that contains a list of well-known ports?
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
C:Windowssystem32driversetcservices
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
50. In a Windows Doamin - How is a GPO Applied?
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
389
X.509 is the standard that covers PKI
53