SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. For which of the following is centralized key management most complicated?
Symmetric Key
NIPS is blocking activities from those specific websites.
Security guard - Proximity reader
SSL
2. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
Asset value
It is used to provide data encryption for WAP connections.
Add input validation to forms.
Change Management System
3. Which of the following are the default ports for HTTP and HTTPS protocols?
80 - 443
TPM
Spam filters
IPSec
4. What port does the Domain Name Service (DNS) use by default?
IPSec
53
IKE
Disable unused ports
5. Which of the following should NOT be used with username/password authentication?
Physical control of the data
Shoulder surfing
Cognitive passwords
Protocol analyzer
6. A system administrator could have a user level account and an administrator account to prevent:...
Baseline reporting
escalation of privileges.
FTPS
Vulnerability scanner
7. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
Decrease the power levels on the WAP
Dumpster diving
Trojans
The PC has become part of a botnet.
8. Which of the following is MOST commonly a part of routine system audits?
Off-site backup
SNMP (also use to monitor the parameters of network devices)
Principle of least privilege
User rights and permissions reviews
9. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
se file servers attached to an NAS system.
Having the offsite location of tapes also be the hot siteservers
Proxies
MAC filtering
10. Which of the following describes when forensic hashing should occur on a drive?
SSL
Vulnerability scan
Before and after the imaging process and then hash the forensic image
Fraud
11. Which of the following security threats does shredding mitigate?
User rights and permissions reviews
Information disclosure
Dumpster diving
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
12. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
Implicit deny
Risk transference
Visibility - Accessibility - Neighborhood crime rate
Asymmetric and Hashing
13. Which of the following is used for exchanging secret keys over an insecure public network?
Privacy policy
Diffie-Hellman
Steganography
The web site's public key.
14. What asymmetric key is used to decrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
Initial vector
War driving
Gas
Command injection
16. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
Memory - network processes - and system processesserver. If the computer is powered off
Steganography
Implement a change management strategy
Botnet
17. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
WPA2
EMI shielding
Buffer overflow
Risk assessmentproduct Answer: D
18. Which of the following is not an asymmetric system?
Evil twin
Implicit deny
DES
Privacy policy
19. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. What key is used to encrypt an HTTPS session?
Symmetric
Polymorphic
User rights and permissions reviews
Platform as a Service
21. In which of the following locations would a forensic analyst look to find a hooked process?
ACLs
BIOS
Multi-factor authentication.
Protocol analyzer
22. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
War driving
Validate input to remove hypertext
Accountability
DoS
23. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Privacy policy
Algorithm
Risk transference
Phishing techniques
24. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
MD5
ICMP
Add input validation to forms.
Configure the IE popup blockers
25. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
HSM
DoS
MAC filtering
Vishing
26. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
Polymorphic
MAC
User rights and permissions reviews
Forward to different RDP listening ports.
27. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
extremely slow and numerous antivirus alerts
content inspection.
Segmentation of each wireless user from other wireless users
VPN concentrator
28. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
MD5
Check if relaying is denied for unauthorized domains
By masking the IP address of internal computers from the Internet
25
29. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
IDEA and TripleDes
Firewall rulesflow of network traffic at the edge of the network
53
White box
30. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Enact a policy banning users from bringing in personal music devices.
Principle of least privilege
WPA Enterprise
signing of a user agreement.
31. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
Platform as a Service
Visibility - Accessibility - Neighborhood crime rate
The PC has become part of a botnet.
NIDS
32. Actively monitoring data streams in search of malicious code or behavior is an example of..
53
Power levels
Deny all
content inspection.
33. Which of the following risks may result from improper use of social networking and P2P software?
Information disclosure
Judgment
ARP poisoning
Determine the potential monetary costs related to a threat
34. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
EMI shielding
mitigation - acceptance - transference
Vulnerability scan
A system that stops an attack in progress.
35. With which of the following is RAID MOST concerned?
Availability
By masking the IP address of internal computers from the Internet
MS-CHAP
CCTV
36. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
The remote router has ICMP blocked.
Cross-site scripting
Vulnerability scanning
Spam filters
37. Risk can be managed in the following ways...
mitigation - acceptance - transference
WPA Enterprise
ACLs
TCP SYN flood attack
38. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Hardware RAID 5 - Software RAID 1
By masking the IP address of internal computers from the Internet
To ensure that staff understands what data they are handling and processing
Mandatory vacations
39. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Physical control of the data
extremely slow and numerous antivirus alerts
Vulnerability scan
VLAN
40. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Clean desk policy
Diffie-Hellman
Mantraps
Rogue access point
41. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Visibility - Accessibility - Neighborhood crime rate
Vulnerability scan
Mantrap
ICMP
42. Which of the following will provide the HIGHEST level of wireless network security?
Buffer overflow
Organize data based on severity and asset value.
Symmetric
WPA2
43. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
SSH
Determine the potential monetary costs related to a threat
Spear phishing
Ensure a proper chain of custody
44. Which of the following is true concerning email message encryption by using S/MIME?
Diffie-Hellman
Only the message data is encrypted
TPM
PEAP-TLS
45. Which of the following environmental variables reduces the potential for static discharges?
Provider cloud
WPA2-PSK
IKE
Humidity
46. Which of the following are accomplished when a message is digitally signed?
Decrease the power levels on the WAP
Integrity and Authentication
Black hat
Hardware RAID 5 - Software RAID 1
47. Which of the following protocols requires the use of a CA based authentication process?
PEAP-TLS
Rogue access point
Diffie-Hellman
Baseline reporting
48. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Implicit deny
Command injection
DAC
25
49. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
IPv6
AC filtering - Disabled SSID broadcast
Smurf attack
Shielding
50. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Run the image through SHA256. Answer: D
Judgment
Multi-factor authentication.
Clustering
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests