SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following uses TCP port 22 by default?
Vishing
Integrity and Authentication
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Software as a Service
2. Which of the following is NOT an application layer security protocol?
Rootkit
DMZ
Software as a Service (SaaS)
IPSec
3. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
Cross-site scripting
Data Encryption Standard (DES)
VLAN segregation
Baseline reporting
4. Which of the following is the MOST secure method of utilizing FTP?
Install a network-based IDS
Deny all
FTPS
VPN concentrator
5. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
SYN attacks
Botnet
Determine the potential monetary costs related to a threat
MD5
6. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
DNS spoofing
User rights and permissions reviews
Business impact analysis
Integrity
7. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Visibility - Accessibility - Neighborhood crime rate
25
Software as a Service
Ensure a proper chain of custody
8. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
IPSec
Organize data based on severity and asset value.
White box
Validate input to remove hypertext
9. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
Symmetric
Vishing
Trojans
1433
10. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Rootkit
53
Firewall - VPN
Multi-factor authentication.
11. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
NIPS is blocking activities from those specific websites.
Ensure a proper chain of custody
Implicit deny
Loop protection
12. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Mantraps
Firewall - VPN
ARP poisoning
22
13. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
Configure the IE popup blockers
Mantrap
Fiber optic
Evil twin
14. With which of the following is RAID MOST concerned?
Availability
escalation of privileges.
Shielding
SSL
15. Which of the following is a management control type?
Rogue access points
Principle of least privilege
Man-in-the-middle
Vulnerability scanning
16. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
Clean desk policy
CAC
IPv6
To provide documentation as to who has handled the evidence
17. Which of the following is specific to a buffer overflow attack?
The PC has become part of a botnet.
Botnet
NOOP instructions
Initial vector
18. What types of encryption are used for adding a digital signature to a message?
Segmentation of each wireless user from other wireless users
Fault tolerance
Asymmetric and Hashing
EMI shielding
19. Which of the following devices would allow a technician to view IP headers on a data packet?
Protocol analyzer
Asymmetric and Hashing
Gas
Video surveillance
20. Which of the following port numbers is used for SCP by default?
Confidentiality - Availability
NIPS is blocking activities from those specific websites.
22
Vulnerability scan
21. Which of the following is a security control that is lost when using cloud computing?
Physical control of the data
Business impact analysis
Accountability
Rootkit
22. Which of the following is used for exchanging secret keys over an insecure public network?
Diffie-Hellman
S/MIME PGP
1433
Software as a Service (SaaS)
23. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
The user's PC is missing the authentication agent.
Enact a policy banning users from bringing in personal music devices.
Availability
User rights and permissions reviews
24. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?
CCTV
Vulnerability scanner
Proxies
Humidity
25. How does a NAT server help protect your network?
War driving
By masking the IP address of internal computers from the Internet
Content filtering
Spear phishing
26. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Confidentiality - Availability
Botnet
IKE
Determine the potential monetary costs related to a threat
27. Which of the following functions is MOST likely performed by a web security gateway?
Security guard - Proximity reader
Content filtering
War driving
Implement a change management strategy
28. Which of the following describes a passive attempt to identify weaknesses?
BIOS
Rogue access points
Vulnerability scanning
Video surveillance
29. Which of the following should be performed on a computer to protect the operating system from malicious software?
Disable unused services - Update HIPS signatures
Having the offsite location of tapes also be the hot siteservers
Disable unused ports
Memory - network processes - and system processesserver. If the computer is powered off
30. Which of the following is MOST commonly a part of routine system audits?
Shielding
User rights and permissions reviews
Humidity
Validate input to remove hypertext
31. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
DAC
Mantraps
Rogue access points
DoS
32. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
Firewall rulesflow of network traffic at the edge of the network
DoS
Evil twin
IPSec
33. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
SSL
Risk assessmentproduct Answer: D
Bluesnarfing
34. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
DoS
The new access point was mis-configured and is interfering with another nearby access point.
The server is missing the default gateway.
Data Encryption Standard (DES)
35. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Asymmetric and Hashing
Initial vector
Block port 23 on the network firewall.
Hierarchical list of critical systems
36. Which of the following includes a photo and can be used for identification?
CAC
VLAN
Block port 23 on the network firewall.
Buffer overflow
37. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
NIDS
Visibility - Accessibility - Neighborhood crime rate
Add input validation to forms.
The user's PC is missing the authentication agent.
38. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
VLAN
Vulnerability scan
Baseline reporting
Determine the potential monetary costs related to a threat
39. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Principle of least privilege
Power levels
Business impact analysis
Rootkit
40. What are typical elements of authentication as part of physical access controls?
ID badges
ARP poisoning
FTPS
Baseline reporting
41. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
To ensure that staff understands what data they are handling and processing
Principle of least privilege
Privacy policy
Protocol analyzer
42. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
User rights
Deny all
Video surveillance
DoS
43. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
User rights
Steganography
ACLs
Disable unused services - Update HIPS signatures
44. Which of the following allows a security administrator to set device traps?
Fiber optic
IPSec
Separation of duties
SNMP (also use to monitor the parameters of network devices)
45. For which of the following is centralized key management most complicated?
Implicit deny
Symmetric Key
Multi-factor authentication.
Accountability
46. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
Spear phishing
Whaling
Smurf attack
ID badges
47. Which of the following MUST a programmer implement to prevent cross-site scripting?
Software as a Service
Validate input to remove hypertext
User rights
Privilege escalation
48. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Asymmetric and Hashing
Ensure a proper chain of custody
Use SSH to connect to the Linux shell
VLAN
49. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
SNMP (also use to monitor the parameters of network devices)
AC filtering - Disabled SSID broadcast
Shoulder surfing
quantitative risk assessment
50. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Only the message data is encrypted
53
ICMP
AES and TKIP
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests