SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
Risk assessmentproduct Answer: D
quantitative risk assessment
White box
Power levels
2. Which of the following is the BEST way to secure data for the purpose of retention?
User rights
53
Separation of duties
Off-site backup
3. Which of the following protocols requires the use of a CA based authentication process?
PEAP-TLS
Chain of custody
Baseline reporting
MAC address
4. Which of the following describes when forensic hashing should occur on a drive?
Social Engineering attack
Before and after the imaging process and then hash the forensic image
Mantraps
Organize data based on severity and asset value.
5. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Vulnerability scan
Integrity
Network Access Control
Confidentiality
6. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Implicit deny
Trojans
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Add input validation to forms.
7. Which of the following is a method to prevent ad-hoc configuration mistakes?
Buffer overflow
BIOS
War driving
Implement a change management strategy
8. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
SYN attacks
Account disablement
Platform as a Service
S/MIME PGP
9. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Fraud
Spear phishing
Mandated security configurations have been made to the operating system.
Disable unused services - Update HIPS signatures
10. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
Hot and cold aisles
Social Engineering attack
Account disablement
Shoulder surfing
11. Which of the following is the primary difference between a virus and a worm?
1433
A worm is self-replicating
The PC has become part of a botnet.
The user's PC is missing the authentication agent.
12. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Protocol analyzer
Accountability
Steganography
Rogue access points
13. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
The web site's public key.
Deny all
ACLs
Logic Bomb
14. The 802.11i standard specifies support for which encryption algorithms?
Add input validation to forms.
Vishing
AES and TKIP
Information disclosure
15. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
Lets you minimize the attack surface relating to the application
ACLs
Risk assessmentproduct Answer: D
WPA Enterprise
16. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
content inspection.
ICMP
Humidity
Memory - network processes - and system processesserver. If the computer is powered off
17. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
content inspection.
Only the message data is encrypted
Rogue access points
Video surveillance
18. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
S/MIME PGP
Cross-site scripting
Baseline reporting
Network Access Control
19. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces
Confidentiality - Availability
Install a network-based IDS
MAC address
Implement a change management strategy
20. Webmail is classified under which of the following cloud-based technologies?
Video surveillance
Software as a Service (SaaS)
Initial vector
Install a network-based IDS
21. Which of the following is the BEST choice for encryption on a wireless network?
S/MIME PGP
WPA2-PSK
mitigation - acceptance - transference
War driving
22. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Command injection
Clustering
Validate input to remove hypertext
ACLs
23. Which of the following devices would allow a technician to view IP headers on a data packet?
IPSec
Protocol analyzer
Algorithm
Security guard - Proximity reader
24. Which of the following port numbers is used for SCP by default?
Location that meets power and connectivity requirementsdatacenter
IDEA and TripleDes
Fiber optic
22
25. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
DMZ
User rights and permissions reviews
Multi-factor authentication.
Provider cloud
26. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
Content filtering
Bluesnarfing
Location that meets power and connectivity requirementsdatacenter
BIOS
27. Which of the following uses TCP port 22 by default?
VLAN
WPA2
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Business impact analysis
28. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
Buffer overflow
TLS
Disable unused services - Update HIPS signatures
ARP poisoning
29. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
EMI shielding
CCTV
Vulnerability scanner
Dumpster diving - Shoulder surfing
30. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Steganography
Decrease the power levels on the WAP
Memory - network processes - and system processesserver. If the computer is powered off
se file servers attached to an NAS system.
31. Which of the following is a management control type?
The PC has become part of a botnet.
Platform as a Service
Shielding
Vulnerability scanning
32. Which of the following should be enabled to ensure only certain wireless clients can access the network?
A worm is self-replicating
MAC filtering
Software as a Service
Clustering
33. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
ACLs
VLAN segregation
Mantraps
CCTV
34. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
escalation of privileges.
Mantraps
Hierarchical list of critical systems
Command injection
35. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
IKE
EMI shielding
ARP poisoning
DMZ
36. Which of the following environmental variables reduces the potential for static discharges?
Humidity
Baseline reporting
Account disablement
The web site's private key.
37. Which of the following are the default ports for HTTP and HTTPS protocols?
The remote router has ICMP blocked.
80 - 443
Tailgating
DMZ
38. In which of the following locations would a forensic analyst look to find a hooked process?
content inspection.
The new access point was mis-configured and is interfering with another nearby access point.
DNS spoofing
BIOS
39. Which of the following security threats does shredding mitigate?
Protocol analyzer
Dumpster diving
Logic Bomb
Platform as a Service
40. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
IPSec
Tailgating
NIPS is blocking activities from those specific websites.
Deny all
41. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
VLAN
Privacy policy
Lets you minimize the attack surface relating to the application
DNS spoofing
42. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi
Confidentiality
BIOS
Principle of least privilege
Symmetric
43. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Block port 23 on the network firewall.
Multi-factor authentication.
Confidentiality
Proxies
44. Which of the following reduces the likelihood of a single point of failure when a server fails?
Clustering
Chain of custody
BIOS
Rogue access points
45. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Symmetric Key
Confidentiality - Availability
Location that meets power and connectivity requirementsdatacenter
Run the image through SHA256. Answer: D
46. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
VLAN
Hierarchical list of critical systems
Evil twin
Physical control of the data
47. Which of the following logical controls does a flood guard protect against?
Logic Bomb
Confidentiality
DNS spoofing
SYN attacks
48. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Hot and cold aisles
Footprinting
Mantrap
User rights
49. Which of the following is a reason to perform user awareness and training?
To minimize the organizational risk posed by users
The user's PC is missing the authentication agent.
Clean desk policy
Buffer overflow
50. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
ARP poisoning
User rights and permissions reviews
Initial vector
Clean desk policy
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests