SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TACACS port number
49
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
443
1. Confidentiality 2. Integrity 3. Availability
2. Examples of Social Engineering Attacks
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
49
BitLocker
3. How does an offline UPS provide power?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. What formula is used to find the number of hosts?
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
(2^number of host bits)-2 = number of hosts
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
C:Windowssystem32driversetcservices
5. How does an incremental backup work?
25
389
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
6. PPTP port number
119
1723
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
7. Goals of Email Security
X.500 is the standard that covers LDAP
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
1. Trust 2. Fear 3. Lack of konwledge
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
8. Symmetric Key Ciphers
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
389
In Windows NT 4 SP4.
1. DES - 64-bit block - 56-bit key - 16 rounds 2. 3DES - DES is used 3 times with 3 different keys 3. AES - 128-bit block - 128/192-bit key - 10/12/14 rounds 4. AES256 - AES used with a 256-bit key 5. RC5 - 32/64/128-bit block - 0-2040 key - 0-255 ro
9. Asymmetric Key Ciphers
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
1723
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
10. What is a hotfix?
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. MD4 - Message Digest 4 (128-bit digest) 2. MD5 - Message Digest 5 (128-bit digest - used in NTLMv2) 3. SHA - Secure Hashing Algorithm (160/256/512-bit digest)
25
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
11. How can you identify a SQL Injection attack?
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
22
An offline UPS remains idle until AC power is lost then it uses its' internal battery to provide power to attached equipment.
12. Telnet port number
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
110
23
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
13. What is a Trojan?
389
A program that appears to be harmless but delivers malicious code to a computer NetBUS and BackOrrifice are two of the most popular trojans - they are typically embedded in benign looking programs - when the programs are executed a backdoor to the sy
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
14. UPS Types
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
1. PPTP - Point to Point Tunneling Protocol 2. L2TP - Layer 2 Tunneling Protocol 3. IPSEC - Internet Protocol Security used to provide encryption for L2TP
In Windows NT 4 SP4.
C:Windowssystem32driversetcservices
15. DHCP port number
67 - 68
119
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
16. Symmetric Key Ciphers
X.500 is the standard that covers LDAP
1723
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
17. Ways to Secure a WiFi Access Point
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
18. Password Attacks
1. John the Ripper 2. Cain & Abel 3. THC Hydra
X.509 is the standard that covers PKI
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
19. User Account Control (UAC) is an Example of
1701
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
1. Elevation Prompt 2. Privilege Elevation
20. What is UBE?
Through the use of digital signatures
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
Unsolicited Bulk Email or SPAM
389
21. What is the standard that covers LDAP?
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
389
X.500 is the standard that covers LDAP
22. Can a VLAN be used to SEGREGATE access to a DHCP server?
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
67 - 68
25
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
23. Do all hosts on a VLAN have to be connected to the same switch?
1. John the Ripper 2. Cain & Abel 3. THC Hydra
1723
No - all hosts on a VLAN do not have to be connected to the same switch - a VLAN can span multiple switches.
In Windows NT 4 SP4.
24. How does a differential backup work?
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
PGP can be used to both encrypt and digitally sign emails - because it can be used to digitally sign emails it provides nonrepudiation.
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
A differential backup backs up all files that have changed since the last full backup - and is quicker to restore than multiple incremental backups.
25. Steps in the OVAL Assessment Process
1. Something you know2. Something you have 3. Something you are
C:Windowssystem32driversetcservices
X.500 is the standard that covers LDAP
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
26. The 3 Ss
1. Something you know2. Something you have 3. Something you are
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
27. What is a Rootkit?
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
1. Diffe-Hellman 2. Elliptic Curve (EC) 3. ElGamal 4. RSA - Rivest - Shamir - Aldeman 5. DSA - Digital Signature Algorithm
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
143
28. What is the difference between an online UPS and a double conversion UPS?
The integrity of a message.
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
Are the same thing.
29. What is THC Hydra?
A fast network authentication password cracker that can go after many different services.
BitLocker
389
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
30. Remote Desktop port number
3389
A rootkit is a form of malicious software that grants full system control to the user. The term comes from the UNIX/Linux environment - where the highest level of system administrator is called the root user.
Here the administrator creates resource access policies and the users cannot modify them. These policies in turn will dictate which user(s) have access to which resource(s).
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
31. POP3 port number
110
23
A tool used to extract NTLM and LANMAN hashes from a Windows based targeted host.
Yes a VLAN can provide scalability because it is configured via software not hardware.
32. What is the standard that covers PKI?
X.509 is the standard that covers PKI
3389
It can be identified by the use of a single quote character which is used to signal to the web server that what follows is a SQL query.
Bastion Host
33. IPSEC Encryption Modes
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
1. Phishing 2. Hoaxes 3. Dumpster Diving 4. Shoulder Surfing
1. S/MIME - Secure Multipurpose Internet Mail Extension 2. PGP - Pretty Good Privacy
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
34. L2TP port number
BitLocker
A combination of files geared - towards fixing one or more security issues with a given piece of software. Note that hotfixes are usually created shortly after a security hole is identified.
1. Elevation Prompt 2. Privilege Elevation
1701
35. HTTPS port number
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
Yes a VLAN can provide scalability because it is configured via software not hardware.
1. Transport Mode - Packet data is encrypted but not the header information. 2. Tunnel Mode - Enitre packet (data & header information) is encrypted.
443
36. Human Behaviors that Social Engineering Will Exploit
1. Trust 2. Fear 3. Lack of konwledge
An incremental backup backs up only those files that have changed since the backup of any type - and is quicker to complete the backup.
An online or double conversion UPS will charge it's battery and provide power to any connected devices at the same time.
Yes because all hosts connected to a VLAN are in the same broadcast domain - and DHCP works based on broadcast packets.
37. Types of Firewalls
80
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
X.500 is the standard that covers LDAP
1. Dictionary 2. Brute Force 3. Rainbow Tables 4. Masked Attack
38. Does PGP rely on X.509 (Digital Certificates - PKI)?
Earlier versions of PGP relied on public key cryptography but not X.509 - it used a web of trust instead. Current versions of PGP include both models through a key management server - X.509 using a hierarchical approach based on a Certificate Authori
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
39. IMAP port number
1. Trust 2. Fear 3. Lack of konwledge
1. Voluntary Tunnel 2. Compulsory Tunnel - Incoming Call 3. Compulsory Tunnel - Remote Dial 4. Multi-Hop Connection Tunnel
143
1. Authentication 2. Authorization 3. Accounting
40. What is a Zombie?
3389
1. True Positive - Correctly identifies an attack 2. True Negative - Correctly identifies legitimate traffic 3. False Positive - Incorrectly identifies legitimate traffic as an attack 4. False Negative - Incorrectly identifies an attack as legitimate
A system that has been compromised by malware and can be remote controlled by another computer during an attack - usually a DDoS attack. Zombies are also known as bots or network robots.
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
41. DNS port number
53
1. Signatures must be updated 2. Zero day exploits
1. Confidentiality 2. Integrity 3. Availability
119
42. What is the name of Vista's hard drive encryption technology?
X.500 is the standard that covers LDAP
BitLocker
143
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
43. Storage Types
1. Online - The most available type of storage. Disk containing data is attached to the network or a system that is attached to the network. Examples include normal backup disk - RAID - and SAN. No direct physical human interaction is required to get
1. Local computer GPO 2. Local administrator and non-administrator GPOs 3. Local user-specific GPO 4. Site GPO 5. Domain GPO 6. Organizational Unit GPO(s)
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
The name of the file that tracks expired certificates is the CRL (Certificate Revocation List).
44. How could a shared virtual machine reduce the workload for IT staff?
1. DES - Data Encryption Standard 2. 3DES - Triple Data Encryption Standard 3. AES - Advanced Encryption Standard 4. AES256 - Advanced Encryption Standard 256-bit 5. RC5 - Rivest Cipher 5 6. RC6 - Rivest Cipher 6 7. Blowfish 8. IDEA - International D
If one application is deployed to 100 workstations it needs to be patched 100 times but if the same application is deployed to 1 shared virtual host it only needs to be patched once.
1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation
1. Elevation Prompt 2. Privilege Elevation
45. A web server that is located outside the DMZ is known as a...
Bastion Host
1. Signatures must be updated 2. Zero day exploits
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power
1. Represent the configuration of the system(s) to be tested. 2. Analyze the system(s) 3. Report the results
46. SMTP port number
1701
1723
25
1. Access Control - MAC Filtering 2. Encryption - WEP - WPA - WPA2 3. Authentication - RADIUS 4. Isolation - VLANs
47. Can a VLAN provide scalability?
1. MAC - Mandatory Access Control 2. DAC - Discretionary Access Control 3. RBAC - Role-Based Access Control 4. NAC - Network Access Control 5. Physical
Yes a VLAN can provide scalability because it is configured via software not hardware.
110
1. SPI - Stateful Packet Inspection firewall 2. Stateless firewall
48. HTTP port number
Are the same thing.
119
80
389
49. LDAP port number
1. LM - Local Area Network Manager (Used in XP and before - DES is the hash) 2. NTLMv1/v2 - New Technology LANMAN (Used in Vista - 7 - and Server 2008) 3. Kerberos - Used in Active Directory
In Windows NT 4 SP4.
389
Are the same thing.
50. The 3 As
1. Authentication 2. Authorization 3. Accounting
1. Technology Weakness 2. Configuration Weakness 3. Policy Weakness 4. Human Error or Malice
Use a solution that supports nonrepudiation
1. Offline/Standby - Power is taken from the AC source (wall) until a power failure occurs then it is switched to the battery. 2. Online (Double Conversion/Delta Conversion) - Power is taken from the battery at all times. 3. Line Interactive - Power