SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?
Decrease the power levels on the WAP
PEAP-TLS
Birthday - Full name
Vulnerability scanner
2. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
Symmetric Key
SSH
extremely slow and numerous antivirus alerts
Trojans
3. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
Visibility - Accessibility - Neighborhood crime rate
Polymorphic
Having the offsite location of tapes also be the hot siteservers
extremely slow and numerous antivirus alerts
4. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
MD5
CAC
DAC
VLAN
5. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
A worm is self-replicating
Only the message data is encrypted
Separation of duties
Organize data based on severity and asset value.
6. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
Software as a Service (SaaS)
Software as a Service
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Virtual servers have the same information security requirements as physical servers.
7. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
Loop protection
Implicit deny
Ensure a proper chain of custody
EMI shielding
8. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Implicit deny
Install a network-based IDS
Implement a change management strategy
Mandated security configurations have been made to the operating system.
9. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
DoS
CCTV
The PC has become part of a botnet.
ICMP
10. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
ID badges
Detective
The new access point was mis-configured and is interfering with another nearby access point.
Firewall - VPN
11. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Information disclosure
Initial vector
Gas
IPSec
12. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Vulnerability scanning
Cross-site scripting
Change Management System
WPA Enterprise
13. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
Memory - network processes - and system processesserver. If the computer is powered off
Accountability
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Ensure a proper chain of custody
14. MAC filtering is a form of which of the following?
Buffer overflow
Enact a policy banning users from bringing in personal music devices.
Network Access Control
User rights
15. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Block port 23 on the network firewall.
Determine the potential monetary costs related to a threat
Logic Bomb
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
16. Which of the following MUST a programmer implement to prevent cross-site scripting?
Validate input to remove hypertext
MAC
Bluesnarfing
Load balancer
17. Which of the following is used when performing a qualitative risk analysis?
ICMP
Judgment
Run the image through SHA256. Answer: D
Software as a Service (SaaS)
18. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
War driving
Confidentiality - Availability
Symmetric Key
Botnet
19. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
Run the image through SHA256. Answer: D
Security guard - Proximity reader
IDEA and TripleDes
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
20. Which of the following is used for exchanging secret keys over an insecure public network?
escalation of privileges.
Diffie-Hellman
IPSec
Mantraps
21. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?
IKE
Fault tolerance
Vulnerability scan
53
22. Which of the following BEST describes an intrusion prevention system?
A system that stops an attack in progress.
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Cross-site scripting
Spam filters
23. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
War driving
Accountability
Video surveillance
Buffer overflow
24. Which of the following assists in identifying if a system was properly handled during transport?
VPN concentrator
Vulnerability scan
User rights
Chain of custody
25. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi
Provider cloud
Firewall - VPN
Fault tolerance
Principle of least privilege
26. Which of the following are accomplished when a message is digitally signed?
Bluesnarfing
Video surveillance
Integrity and Authentication
Mandatory vacation
27. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
Rootkit
Botnet
ARP poisoning
MAC address
28. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
DAC
Footprinting
Firewall rulesflow of network traffic at the edge of the network
IPSec
29. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
ACLs
TLS
Decrease the power levels on the WAP
Smurf attack
31. Which of the following facilitates computing for heavily utilized systems and networks?
Provider cloud
FTPS
Footprinting
MAC address
32. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
Software as a Service (SaaS)
TPM
Man-in-the-middle
TCP SYN flood attack
33. Which solution should you use?
se file servers attached to an NAS system.
Rogue access point
Rogue access points
Segmentation of each wireless user from other wireless users
34. Which of the following environmental variables reduces the potential for static discharges?
ARP poisoning
IKE
Cross-site scripting
Humidity
35. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
Social Engineering attack
TCP SYN flood attack
VLAN segregation
War driving
36. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Protocol analyzer
Privacy policy
AC filtering - Disabled SSID broadcast
Multi-factor authentication.
37. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
Integrity and Authentication
Protocol analyzer
Decrease the power levels on the WAP
System A fails open. System B fails closed.
38. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
MAC
Footprinting
Only the message data is encrypted
Asset value
39. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
Symmetric Key
extremely slow and numerous antivirus alerts
Buffer overflow
Mantraps
40. Which of the following is a security control that is lost when using cloud computing?
Physical control of the data
Cross-site scripting
IKE
IDEA and TripleDes
41. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
Implement a change management strategy
Trojans
PEAP-TLS
Mantrap
42. Which of the following reduces the likelihood of a single point of failure when a server fails?
Clustering
Privacy policy
Diffie-Hellman
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
43. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
The web site's private key.
User rights
Symmetric
CAC
44. Which of the following BEST describes the proper method and reason to implement port security?
Cognitive passwords
Buffer overflow
IPSec
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
45. Which of the following is a technique designed to obtain information from a specific person?
The web site's public key.
Vulnerability scan
Botnet
Spear phishing
46. Risk can be managed in the following ways...
Principle of least privilege
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
mitigation - acceptance - transference
Symmetric Key
47. Which of the following should NOT be used with username/password authentication?
Loop protection
Cognitive passwords
Mandated security configurations have been made to the operating system.
Vulnerability scan
48. DRPs should contain which of the following?
Validate input to remove hypertext
Vishing
Hierarchical list of critical systems
HSM
49. Which of the following threats corresponds with an attacker targeting specific employees of a company?
System A fails open. System B fails closed.
Before and after the imaging process and then hash the forensic image
Spear phishing
Vulnerability scanning
50. What allows for all activities on a network or system to be traced to the user who performed them?
Gas
Humidity
WPA2-PSK
Accountability