SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
Vishing
Decrease the power levels on the WAP
MS-CHAP
Clean desk policy
2. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
S/MIME PGP
Command injection
Risk transference
Integrity and Authentication
3. Webmail is classified under which of the following cloud-based technologies?
Integrity and Authentication
Software as a Service (SaaS)
Hardware RAID 5 - Software RAID 1
Only the message data is encrypted
4. Which of the following describes when forensic hashing should occur on a drive?
IPSec
Gas
Before and after the imaging process and then hash the forensic image
Account disablement
5. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
Confidentiality - Availability
Integrity and Authentication
TPM
Only the message data is encrypted
6. Which of the following should be installed to prevent employees from receiving unsolicited emails?
Integrity and Authentication
Principle of least privilege
NIPS is blocking activities from those specific websites.
Spam filters
7. Which of the following BEST describes an intrusion prevention system?
Use SSH to connect to the Linux shell
Dumpster diving - Shoulder surfing
A system that stops an attack in progress.
AES and TKIP
8. Which of the following MUST a programmer implement to prevent cross-site scripting?
Mantrap
MAC
Validate input to remove hypertext
signing of a user agreement.
9. Which of the following should be performed on a computer to protect the operating system from malicious software?
Confidentiality
By masking the IP address of internal computers from the Internet
Logic Bomb
Disable unused services - Update HIPS signatures
10. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Integrity
Symmetric
To ensure that staff understands what data they are handling and processing
Privilege escalation
11. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
War driving
Software as a Service
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Baseline reporting
12. For which of the following is centralized key management most complicated?
Ensure a proper chain of custody
Mantraps
Symmetric Key
IPv6
13. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?
MAC filtering
Clustering
Phishing techniques
Blind FTP
14. Which of the following is specific to a buffer overflow attack?
Pharming - Logic bomb
NIDS
Initial vector
Shielding
15. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
BIOS
Least privilege
Mantraps
War driving
16. Which of the following port numbers is used for SCP by default?
Configure the IE popup blockers
User rights and permissions reviews
22
Check if relaying is denied for unauthorized domains
17. Which of the following devices would allow a technician to view IP headers on a data packet?
Protocol analyzer
Firewall rulesflow of network traffic at the edge of the network
Integrity and Authentication
PEAP-TLS
18. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
Ensure a proper chain of custody
Vulnerability scanning
To minimize the organizational risk posed by users
Segmentation of each wireless user from other wireless users
19. Which of the following is used for exchanging secret keys over an insecure public network?
Implicit deny
Diffie-Hellman
IPSec
Block port 23 on the network firewall.
20. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Detective
The server is missing the default gateway.
ARP poisoning
Having the offsite location of tapes also be the hot siteservers
21. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Use SSH to connect to the Linux shell
extremely slow and numerous antivirus alerts
Rogue access points
Run the image through SHA256. Answer: D
22. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
WPA Enterprise
Ensure a proper chain of custody
Algorithm
NOOP instructions
23. What key is used to encrypt an HTTPS session?
Diffie-Hellman
Symmetric
Vulnerability scanning
Buffer overflow
24. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?
PEAP-TLS
WPA Enterprise
Vulnerability scanner
NIPS is blocking activities from those specific websites.
25. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
User rights
Cross-site scripting
The PC has become part of a botnet.
Buffer overflow
26. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
ID badges
ARP poisoning
WPA2
Data Encryption Standard (DES)
27. How does a NAT server help protect your network?
By masking the IP address of internal computers from the Internet
Chain of custody
Gas
Mandated security configurations have been made to the operating system.
28. Which environmental control is part of TEMPEST compliance?
SNMP (also use to monitor the parameters of network devices)
Vulnerability scanner
Physical control of the data
Shielding
29. Which of the following BEST explains the security benefit of a standardized server image?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Mandated security configurations have been made to the operating system.
22
Before and after the imaging process and then hash the forensic image
30. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
Determine the potential monetary costs related to a threat
Configure the IE popup blockers
Validate input to remove hypertext
IPv6
31. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
SYN attacks
Hot and cold aisles
1433
DES
32. What asymmetric key is used to decrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
Vulnerability scan
NOOP instructions
Account disablement
Humidity
34. Which of the following is true concerning email message encryption by using S/MIME?
IPSec
Asset value
Only the message data is encrypted
To provide documentation as to who has handled the evidence
35. Actively monitoring data streams in search of malicious code or behavior is an example of..
content inspection.
Dumpster diving
Accountability
Cognitive passwords
36. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
Asymmetric and Hashing
IKE
Integrity
DMZ
37. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Software as a Service (SaaS)
Baseline reporting
Footprinting
MAC address
38. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
DES
Mandatory vacations
Botnet
The development team is transferring data to test systems using SFTP and SCP.
39. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
The development team is transferring data to test systems using SFTP and SCP.
EMI shielding
FTPS
Multi-factor authentication.
40. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Pharming - Logic bomb
Fault tolerance
Block port 23 on the network firewall.
To provide documentation as to who has handled the evidence
41. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?
Principle of least privilege
Platform as a Service
escalation of privileges.
Cross-site scripting
42. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi
Initial vector
Least privilege
Principle of least privilege
Information disclosure
43. Which of the following is MOST likely to be the last rule contained on any firewall?
Symmetric Key
MAC filtering
Virtual servers have the same information security requirements as physical servers.
Implicit deny
44. Which of the following will provide the HIGHEST level of wireless network security?
WPA2
Provider cloud
DoS
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
45. Which solution should you use?
Least privilege
The web site's public key.
se file servers attached to an NAS system.
Loop protection
46. Which of the following is the MOST secure method of utilizing FTP?
Command injection
TLS
FTPS
EMI shielding
47. Which of the following access control models allows classification and labeling of objects?
Principle of least privilege
MAC
Least privilege
Man-in-the-middle
48. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
To ensure that staff understands what data they are handling and processing
content inspection.
War driving
Load balancer
49. On-going annual awareness security training should be coupled with:..
Buffer overflow
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
signing of a user agreement.
Hot and cold aisles
50. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Confidentiality - Availability
CAC
Privacy policy