SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Enact a policy banning users from bringing in personal music devices.
IPSec
Blind FTP
Least privilege
2. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
Configure the IE popup blockers
Integrity and Authentication
The user's PC is missing the authentication agent.
SSL
3. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?
DMZ
Platform as a Service
1433
DoS
4. Which of the following is a best practice when securing a switch from physical access?
Disable unused ports
Location that meets power and connectivity requirementsdatacenter
Proxies
MS-CHAP
5. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Rootkit
Information disclosure
Organize data based on severity and asset value.
Mandatory vacation
6. Which of the following facilitates computing for heavily utilized systems and networks?
22
Provider cloud
Physical control of the data
Mantraps
7. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Firewall rulesflow of network traffic at the edge of the network
Cross-site scripting
Firewall - VPN
Virtual servers have the same information security requirements as physical servers.
8. Which of the following assists in identifying if a system was properly handled during transport?
Chain of custody
IDEA and TripleDes
Mantraps
Business impact analysis
9. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
DoS
The PC has become part of a botnet.
MAC
WPA2
10. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Having the offsite location of tapes also be the hot siteservers
Vulnerability scanning
25
WPA2-PSK
11. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
HSM
Decrease the power levels on the WAP
BIOS
Before and after the imaging process and then hash the forensic image
12. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
Spear phishing
Organize data based on severity and asset value.
NIPS is blocking activities from those specific websites.
Implicit deny
13. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
IDS
DMZ
Fiber optic
DMZ
14. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
System A fails open. System B fails closed.
NOOP instructions
Rogue access points
Vulnerability scanning
15. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Implicit deny
Privacy policy
Symmetric Key
Vulnerability scan
16. Which of the following is used for exchanging secret keys over an insecure public network?
DES
Diffie-Hellman
Virtual servers have the same information security requirements as physical servers.
Mandatory vacations
17. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
Mandatory vacations
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
User rights and permissions reviews
By masking the IP address of internal computers from the Internet
18. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
EMI shielding
Vulnerability scan
Dumpster diving - Shoulder surfing
Hardware RAID 5 - Software RAID 1
19. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Power levels
VLAN
Privilege escalation
Integrity
20. What types of encryption are used for adding a digital signature to a message?
Asymmetric and Hashing
VLAN
Decrease the power levels on the WAP
Clean desk policy
21. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
Man-in-the-middle
Network Access Control
Hardware RAID 5 - Software RAID 1
VPN concentrator
22. Which of the following is the MAIN reason to require data labeling?
Integrity
To ensure that staff understands what data they are handling and processing
Baseline reporting
53
23. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
System A fails open. System B fails closed.
extremely slow and numerous antivirus alerts
Algorithm
Multi-factor authentication.
24. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Memory - network processes - and system processesserver. If the computer is powered off
Integrity
Power levels
Off-site backup
25. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
The new access point was mis-configured and is interfering with another nearby access point.
NIDS
Deny all
Mantrap
26. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Firewall - VPN
ICMP
Judgment
User rights
27. Which of the following attacks would password masking help mitigate?
Shoulder surfing
se file servers attached to an NAS system.
Algorithm
NIPS is blocking activities from those specific websites.
28. Which of the following is another name for a malicious attacker?
Black hat
Baseline reporting
Evil twin
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
29. Which of the following are the default ports for HTTP and HTTPS protocols?
Chain of custody
Proxies
Hierarchical list of critical systems
80 - 443
30. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Principle of least privilege
CAC
Algorithm
31. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
TLS
Virtual servers have the same information security requirements as physical servers.
Mandatory vacation
content inspection.
32. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
IPv6
Only the message data is encrypted
VLAN
Phishing techniques
33. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
ARP poisoning
Change Management System
MAC
Cross-site scripting
34. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
Business impact analysis
Trojans
The web site's private key.
The new access point was mis-configured and is interfering with another nearby access point.
35. With which of the following is RAID MOST concerned?
Availability
content inspection.
Whaling
Off-site backup
36. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
Polymorphic
Firewall rulesflow of network traffic at the edge of the network
Evil twin
Fraud
37. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
TCP SYN flood attack
Account disablement
Bluesnarfing
1433
38. Which of the following uses TCP port 22 by default?
Before and after the imaging process and then hash the forensic image
By masking the IP address of internal computers from the Internet
Lets you minimize the attack surface relating to the application
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
39. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
VLAN segregation
Shoulder surfing
Check if relaying is denied for unauthorized domains
WPA2-PSK
40. What port does the Domain Name Service (DNS) use by default?
Confidentiality
The web site's private key.
53
Asymmetric and Hashing
41. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Logic Bomb
Dumpster diving
Vulnerability scan
escalation of privileges.
42. Which of the following is specific to a buffer overflow attack?
Load balancer
ACLs
Initial vector
Least privilege
43. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
Principle of least privilege
SYN attacks
Spear phishing
MAC
44. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
The web site's private key.
Add input validation to forms.
TCP SYN flood attack
Multi-factor authentication.
45. What is the advantage of using application virtualization?
Decrease the power levels on the WAP
Lets you minimize the attack surface relating to the application
Cross-site scripting
Implicit deny
46. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
IPSec
Least privilege
DNS spoofing
Location that meets power and connectivity requirementsdatacenter
47. Which solution should you use?
Check if relaying is denied for unauthorized domains
se file servers attached to an NAS system.
25
Change Management System
48. Webmail is classified under which of the following cloud-based technologies?
Software as a Service (SaaS)
Shielding
The user's PC is missing the authentication agent.
The new access point was mis-configured and is interfering with another nearby access point.
49. Which of the following is MOST likely to be the last rule contained on any firewall?
Check if relaying is denied for unauthorized domains
1433
Rootkit
Implicit deny
50. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Steganography
Separation of duties
Content filtering
Chain of custody
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests