SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. LDAP port number
BitLocker
389
1723
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
2. PPTP port number
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1723
3. In a Windows Doamin - How is a GPO Applied?
49
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
4. How can you identify a SQL Injection attack?
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
5. SMTP port number
25
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
1. Confidentiality 2. Integrity 3. Availability
110
6. DHCP port number
67 - 68
389
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. John the Ripper 2. Cain & Abel 3. THC Hydra
7. IDS/IPS Alerts
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
25
8. User Account Control (UAC) is an Example of
Are the same thing.
110
1. Elevation Prompt 2. Privilege Elevation
A fast network authentication password cracker that can go after many different services.
9. Remote Desktop port number
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
1. Confidentiality 2. Integrity 3. Availability
3389
10. The Primary Causes of Compromised Security
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
1. Signatures must be updated 2. Zero day exploits
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
11. Can PGP be used to provide nonrepudiation?
1. Signatures must be updated 2. Zero day exploits
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
BitLocker
12. Asymmetric Key Ciphers
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
443
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
13. What is a Zombie?
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
67 - 68
80
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
14. The Goals of Security
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
1. Confidentiality 2. Integrity 3. Availability
443
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
15. Types of L2TP Tunnels
A fast network authentication password cracker that can go after many different services.
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
16. What is UBE?
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
Bastion Host
Unsolicited Bulk Email or SPAM
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
17. How could a shared virtual machine reduce the workload for IT staff?
1723
67 - 68
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
18. What is the name of Vista's hard drive encryption technology?
1. Authentication 2. Authorization 3. Accounting
23
BitLocker
53
19. Asymmetric Key Ciphers
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
20. The 3 Ss
(2^number of host bits)-2 = number of hosts
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
1. Something you know2. Something you have 3. Something you are
X.500 is the standard that covers LDAP
21. Can a VLAN provide scalability?
1. Confidentiality 2. Integrity 3. Availability
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
Yes a VLAN can provide scalability because it is configured via software not hardware.
22. Symmetric Key Ciphers
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
23. The 3 As
X.500 is the standard that covers LDAP
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
1. Authentication 2. Authorization 3. Accounting
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
24. Protocols Used for VPN
1. Something you know2. Something you have 3. Something you are
The integrity of a message.
Use a solution that supports nonrepudiation
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
25. HTTPS port number
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
443
1. Trust 2. Fear 3. Lack of konwledge
26. What is the standard that covers LDAP?
X.500 is the standard that covers LDAP
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
1. Something you know2. Something you have 3. Something you are
27. How does a differential backup work?
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
A fast network authentication password cracker that can go after many different services.
28. Versions of NAT
1. Elevation Prompt 2. Privilege Elevation
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
1. Signatures must be updated 2. Zero day exploits
49
29. What do digital signatures prove?
389
The integrity of a message.
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
30. UPS Types
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
1. Trust 2. Fear 3. Lack of konwledge
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
143
31. What is output validation?
32. What is the SLE (Single Loss Expectancy)?
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
The asset value multiplied by the exposure factor asset value x exposure factor = SLE
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
33. L2TP port number
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
Unsolicited Bulk Email or SPAM
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
1701
34. What is a Rootkit?
143
443
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
35. How does an incremental backup work?
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
36. Human Behaviors that Social Engineering Will Exploit
Bastion Host
1701
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1. Trust 2. Fear 3. Lack of konwledge
37. Windows Password Authentication Protocols
BitLocker
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
389
Are the same thing.
38. TACACS port number
49
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
39. What formula is used to find the number of hosts?
Unsolicited Bulk Email or SPAM
The integrity of a message.
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
(2^number of host bits)-2 = number of hosts
40. DNS port number
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
53
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
41. Types of Firewalls
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
42. Do all hosts on a VLAN have to be connected to the same switch?
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
Bastion Host
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
43. How do you ensure an email comes from the person it advertises as being the sender?
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
Use a solution that supports nonrepudiation
44. How does an offline UPS provide power?
45. POP3 port number
1. Trust 2. Fear 3. Lack of konwledge
53
389
110
46. IPSEC Encryption Modes
Are the same thing.
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
47. NNTP port number
1. Trust 2. Fear 3. Lack of konwledge
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. Elevation Prompt 2. Privilege Elevation
119
48. Access Control Models
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
1. John the Ripper 2. Cain & Abel 3. THC Hydra
(2^number of host bits)-2 = number of hosts
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
49. How does the MAC model work?
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
In Windows NT 4 SP4.
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
50. What is a Trojan?
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy