SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IMAP port number
143
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
23
1. Trust 2. Fear 3. Lack of konwledge
2. Symmetric Key Ciphers
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
3. The Goals of Security
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1. Confidentiality 2. Integrity 3. Availability
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
4. How does an online/double conversion UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. How could a shared virtual machine reduce the workload for IT staff?
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
1. Authentication 2. Authorization 3. Accounting
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
6. In a Windows Doamin - How is a GPO Applied?
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
BitLocker
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
1723
7. LDAP port number
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
3389
389
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
8. IPSEC Encryption Modes
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
110
9. NNTP port number
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
119
10. Password Attacks
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
Yes a VLAN can provide scalability because it is configured via software not hardware.
The integrity of a message.
11. A web server that is located outside the DMZ is known as a...
1723
Bastion Host
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
1. Authentication 2. Authorization 3. Accounting
12. The Primary Causes of Compromised Security
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
In Windows NT 4 SP4.
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
13. How does the MAC model work?
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
Yes a VLAN can provide scalability because it is configured via software not hardware.
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
143
14. The 3 Ss
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
X.509 is the standard that covers PKI
1. Something you know2. Something you have 3. Something you are
23
15. Ways to Secure a WiFi Access Point
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
143
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
23
16. In PKI what is the name of the file that tracks expired certificates?
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
1. Something you know2. Something you have 3. Something you are
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
17. What is a Rootkit?
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
Bastion Host
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
(2^number of host bits)-2 = number of hosts
18. What is a Trojan?
A fast network authentication password cracker that can go after many different services.
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
19. What is PWDUMP?
C:Windowssystem32driversetcservices
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1. Elevation Prompt 2. Privilege Elevation
20. When was NTLMv2 first introduced?
BitLocker
In Windows NT 4 SP4.
Through the use of digital signatures
Bastion Host
21. What is the name of Vista's hard drive encryption technology?
X.509 is the standard that covers PKI
1723
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
BitLocker
22. Access Control Models
1. Trust 2. Fear 3. Lack of konwledge
110
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
23. What is a Zombie?
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
BitLocker
Through the use of digital signatures
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
24. Storage Types
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
25. DHCP port number
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
67 - 68
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. Authentication 2. Authorization 3. Accounting
26. SMTP port number
25
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
1. Diffe-Hellman - Used in key exchange 2. Elliptic Curve - Used in OpenSSL and Bouncy Castle for Java & C# - .Net framework. 3. ElGamal - Used in PGP and GNU Privacy Guard 4. RSA - One of the best known public key ciphers - it was developed at MIT.
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
27. Secure Email Protocols
Unsolicited Bulk Email or SPAM
Through the use of digital signatures
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
28. Asymmetric Key Ciphers
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
29. What is THC Hydra?
22
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
A fast network authentication password cracker that can go after many different services.
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
30. What do digital signatures prove?
Use a solution that supports nonrepudiation
The integrity of a message.
3389
1701
31. Versions of NAT
1. Authentication 2. Authorization 3. Accounting
1701
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
110
32. Windows Password Authentication Protocols
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
Unsolicited Bulk Email or SPAM
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
33. Remote Desktop port number
1. Signatures must be updated 2. Zero day exploits
3389
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
Bastion Host
34. What is output validation?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. HTTPS port number
25
443
Are the same thing.
BitLocker
36. L2TP port number
1. Confidentiality 2. Integrity 3. Availability
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
1. John the Ripper 2. Cain & Abel 3. THC Hydra
1701
37. UPS Types
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
119
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
1. Authentication 2. Authorization 3. Accounting
38. What is the standard that covers LDAP?
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
X.500 is the standard that covers LDAP
39. In Windows what is the path to the file that contains a list of well-known ports?
X.509 is the standard that covers PKI
C:Windowssystem32driversetcservices
1. Authentication 2. Authorization 3. Accounting
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
40. Weaknesses of Antivirus Software
1. Signatures must be updated 2. Zero day exploits
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
41. Steps in the OVAL Assessment Process
Unsolicited Bulk Email or SPAM
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
BitLocker
42. POP3 port number
110
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
1. Elevation Prompt 2. Privilege Elevation
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
43. Types of Firewalls
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
1. Dynamic NAT - A private IP address is mapped to a public IP address drawing from a pool of registered public IP addresses (one-to-many). 2. Static NAT - A private IP address is mapped to a public IP address the public IP address that is being mapp
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
44. How do you ensure an email comes from the person it advertises as being the sender?
Use a solution that supports nonrepudiation
389
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
Anything that impacts or edits the way in which a server/application responds/answers a user's request.
45. Protocols Used for VPN
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
1. Trust 2. Fear 3. Lack of konwledge
1. Signatures must be updated 2. Zero day exploits
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
46. Goals of Email Security
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
Through the use of digital signatures
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
47. HTTP port number
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
80
Through the use of digital signatures
48. PPTP port number
(2^number of host bits)-2 = number of hosts
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
1723
80
49. How does an incremental backup work?
1. Elevation Prompt 2. Privilege Elevation
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
50. The 3 As
1. Authentication 2. Authorization 3. Accounting
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.