SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IPSEC Encryption Modes
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. Confidentiality 2. Integrity 3. Availability
The integrity of a message.
2. What is the standard that covers LDAP?
Bastion Host
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
X.500 is the standard that covers LDAP
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
3. What is the difference between an online UPS and a double conversion UPS?
Are the same thing.
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
Use a solution that supports nonrepudiation
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
4. Password Crackers
1. John the Ripper 2. Cain & Abel 3. THC Hydra
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
49
5. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?
80
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
Through the use of digital signatures
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
6. LDAP port number
Yes a VLAN can provide scalability because it is configured via software not hardware.
389
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
53
7. What is a Trojan?
80
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
3389
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
8. In Windows what is the path to the file that contains a list of well-known ports?
C:Windowssystem32driversetcservices
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
9. What is a Rootkit?
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
25
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
10. The Primary Causes of Compromised Security
1. Trust 2. Fear 3. Lack of konwledge
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
53
11. Weaknesses of Antivirus Software
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
1. Signatures must be updated 2. Zero day exploits
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
12. POP3 port number
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
C:Windowssystem32driversetcservices
110
143
13. When was NTLMv2 first introduced?
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
(2^number of host bits)-2 = number of hosts
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
In Windows NT 4 SP4.
14. What is output validation?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. Types of Firewalls
1723
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
67 - 68
16. PPTP port number
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1723
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
17. Human Behaviors that Social Engineering Will Exploit
1. Elevation Prompt 2. Privilege Elevation
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
1. Trust 2. Fear 3. Lack of konwledge
80
18. Does PGP rely on X.509 (Digital Certificates - PKI)?
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
The integrity of a message.
67 - 68
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
19. User Account Control (UAC) is an Example of
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. Elevation Prompt 2. Privilege Elevation
In Windows NT 4 SP4.
20. How does the MAC model work?
110
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
21. How does an incremental backup work?
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
Yes a VLAN can provide scalability because it is configured via software not hardware.
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
22. HTTPS port number
443
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
119
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
23. How does an online/double conversion UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. Ways to Secure a WiFi Access Point
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
443
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
67 - 68
25. What is UBE?
Unsolicited Bulk Email or SPAM
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
Through the use of digital signatures
26. Steps in the OVAL Assessment Process
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
110
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
X.500 is the standard that covers LDAP
27. Asymmetric Key Ciphers
Use a solution that supports nonrepudiation
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
28. In a Windows Doamin - How is a GPO Applied?
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
53
Are the same thing.
29. Symmetric Key Ciphers
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
Through the use of digital signatures
22
X.509 is the standard that covers PKI
30. What do digital signatures prove?
389
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
The integrity of a message.
31. HTTP port number
80
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
32. Checksums
1. Elevation Prompt 2. Privilege Elevation
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
33. NNTP port number
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
119
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
34. Storage Types
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
35. Access Control Models
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
C:Windowssystem32driversetcservices
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
36. Can a VLAN be used to SEGREGATE access to a DHCP server?
1723
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
37. What is PWDUMP?
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
A fast network authentication password cracker that can go after many different services.
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
38. UPS Types
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
The integrity of a message.
39. IMAP port number
25
143
A fast network authentication password cracker that can go after many different services.
49
40. The 3 As
Through the use of digital signatures
C:Windowssystem32driversetcservices
1. Signatures must be updated 2. Zero day exploits
1. Authentication 2. Authorization 3. Accounting
41. Secure Email Protocols
1. Signatures must be updated 2. Zero day exploits
1. Something you know2. Something you have 3. Something you are
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
42. Symmetric Key Ciphers
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
389
1. Trust 2. Fear 3. Lack of konwledge
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
43. How does an offline UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. Do all hosts on a VLAN have to be connected to the same switch?
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
C:Windowssystem32driversetcservices
X.509 is the standard that covers PKI
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
45. The 3 Ss
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
1. Something you know2. Something you have 3. Something you are
(2^number of host bits)-2 = number of hosts
46. What is the SLE (Single Loss Expectancy)?
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
1723
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
Bastion Host
47. What is the standard that covers PKI?
443
X.509 is the standard that covers PKI
25
389
48. Can PGP be used to provide nonrepudiation?
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
53
49. A web server that is located outside the DMZ is known as a...
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
Bastion Host
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
50. Asymmetric Key Ciphers
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
1. Something you know2. Something you have 3. Something you are
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
1. Elevation Prompt 2. Privilege Elevation