SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Types of L2TP Tunnels
22
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
2. Asymmetric Key Ciphers
1. Signatures must be updated 2. Zero day exploits
X.509 is the standard that covers PKI
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
3. PPTP port number
1723
C:Windowssystem32driversetcservices
25
In Windows NT 4 SP4.
4. What do digital signatures prove?
The integrity of a message.
C:Windowssystem32driversetcservices
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
5. Access Control Models
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
In Windows NT 4 SP4.
1. Elevation Prompt 2. Privilege Elevation
53
6. What is a hotfix?
In Windows NT 4 SP4.
X.509 is the standard that covers PKI
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
7. The 3 As
Yes a VLAN can provide scalability because it is configured via software not hardware.
1. Authentication 2. Authorization 3. Accounting
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
(2^number of host bits)-2 = number of hosts
8. What is PWDUMP?
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
X.509 is the standard that covers PKI
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
9. In a Windows Doamin - How is a GPO Applied?
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
Bastion Host
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
10. Storage Types
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
Yes a VLAN can provide scalability because it is configured via software not hardware.
11. Human Behaviors that Social Engineering Will Exploit
Use a solution that supports nonrepudiation
1. Trust 2. Fear 3. Lack of konwledge
23
In Windows NT 4 SP4.
12. Can a VLAN provide scalability?
25
Bastion Host
23
Yes a VLAN can provide scalability because it is configured via software not hardware.
13. What formula is used to find the number of hosts?
(2^number of host bits)-2 = number of hosts
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
1701
14. What is a Rootkit?
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
1. Trust 2. Fear 3. Lack of konwledge
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
15. What is output validation?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. The 3 Ss
22
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
143
1. Something you know2. Something you have 3. Something you are
17. A web server that is located outside the DMZ is known as a...
1. Elevation Prompt 2. Privilege Elevation
1. Confidentiality 2. Integrity 3. Availability
1. Signatures must be updated 2. Zero day exploits
Bastion Host
18. When was NTLMv2 first introduced?
X.509 is the standard that covers PKI
In Windows NT 4 SP4.
119
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
19. How could a shared virtual machine reduce the workload for IT staff?
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
1. Something you know2. Something you have 3. Something you are
143
20. Asymmetric Key Ciphers
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
143
25
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
21. LDAP port number
Yes a VLAN can provide scalability because it is configured via software not hardware.
389
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
22. Versions of NAT
(2^number of host bits)-2 = number of hosts
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
1723
23. DHCP port number
67 - 68
A fast network authentication password cracker that can go after many different services.
80
X.509 is the standard that covers PKI
24. How does an online/double conversion UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. What is the standard that covers PKI?
110
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
X.509 is the standard that covers PKI
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
26. Password Crackers
1. Trust 2. Fear 3. Lack of konwledge
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
1. John the Ripper 2. Cain & Abel 3. THC Hydra
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
27. The Primary Causes of Compromised Security
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
1. Trust 2. Fear 3. Lack of konwledge
28. UPS Types
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
25
53
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
29. TACACS port number
1. Elevation Prompt 2. Privilege Elevation
49
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
C:Windowssystem32driversetcservices
30. IDS/IPS Alerts
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
Yes a VLAN can provide scalability because it is configured via software not hardware.
BitLocker
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
31. What is the SLE (Single Loss Expectancy)?
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
32. How does an incremental backup work?
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
The integrity of a message.
33. HTTPS port number
1701
443
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
A fast network authentication password cracker that can go after many different services.
34. What is UBE?
1723
A fast network authentication password cracker that can go after many different services.
1. John the Ripper 2. Cain & Abel 3. THC Hydra
Unsolicited Bulk Email or SPAM
35. SMTP port number
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
C:Windowssystem32driversetcservices
25
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
36. How does a differential backup work?
443
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
1. Elevation Prompt 2. Privilege Elevation
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
37. What is a Zombie?
Through the use of digital signatures
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
Are the same thing.
1723
38. Examples of Social Engineering Attacks
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
110
1701
39. Protocols Used for VPN
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
1. John the Ripper 2. Cain & Abel 3. THC Hydra
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
40. What is a Trojan?
Unsolicited Bulk Email or SPAM
53
3389
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
41. IMAP port number
143
53
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
42. Does PGP rely on X.509 (Digital Certificates - PKI)?
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
(2^number of host bits)-2 = number of hosts
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
X.509 is the standard that covers PKI
43. How can you identify a SQL Injection attack?
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
67 - 68
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
44. HTTP port number
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
49
1. Authentication 2. Authorization 3. Accounting
80
45. What is the name of Vista's hard drive encryption technology?
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
X.509 is the standard that covers PKI
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
BitLocker
46. POP3 port number
110
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
47. What is the difference between an online UPS and a double conversion UPS?
BitLocker
1. Authentication 2. Authorization 3. Accounting
49
Are the same thing.
48. How can you introduce nonrepudiation and authentication to Mutual SSL client authentication?
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
1. Signatures must be updated 2. Zero day exploits
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
Through the use of digital signatures
49. In Windows what is the path to the file that contains a list of well-known ports?
C:Windowssystem32driversetcservices
119
25
1. John the Ripper 2. Cain & Abel 3. THC Hydra
50. Do all hosts on a VLAN have to be connected to the same switch?
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
Bastion Host
Unsolicited Bulk Email or SPAM
X.500 is the standard that covers LDAP