SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which environmental control is part of TEMPEST compliance?
Block port 23 on the network firewall.
Network Access Control
The user's PC is missing the authentication agent.
Shielding
2. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
The server is missing the default gateway.
DoS
FTPS
The new access point was mis-configured and is interfering with another nearby access point.
3. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
Evil twin
Mandatory vacation
IDS
User rights
4. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
Decrease the power levels on the WAP
Organize data based on severity and asset value.
BIOS
User rights
5. Webmail is classified under which of the following cloud-based technologies?
Software as a Service (SaaS)
Fiber optic
Block port 23 on the network firewall.
HSM
6. Which of the following is NOT an application layer security protocol?
IPSec
Command injection
Lets you minimize the attack surface relating to the application
By masking the IP address of internal computers from the Internet
7. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
signing of a user agreement.
Business impact analysis
Software as a Service
IPSec
8. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
A system that stops an attack in progress.
Principle of least privilege
IDEA and TripleDes
To provide documentation as to who has handled the evidence
9. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Physical control of the data
TCP SYN flood attack
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
WPA Enterprise
10. What asymmetric key is used to encrypt when using HTTPS?
11. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m
Add input validation to forms.
The new access point was mis-configured and is interfering with another nearby access point.
Cross-site scripting
Dumpster diving
12. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
Phishing techniques
IPSec
CCTV
MS-CHAP
13. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
Separation of duties
Black hat
Dumpster diving
25
14. What are typical elements of authentication as part of physical access controls?
ID badges
The development team is transferring data to test systems using SFTP and SCP.
80 - 443
DES
15. Which of the following should be installed to prevent employees from receiving unsolicited emails?
Configure the IE popup blockers
Spam filters
53
User rights
16. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
Configure the IE popup blockers
Privacy policy
Risk assessmentproduct Answer: D
Vulnerability scan
17. Which of the following logical controls does a flood guard protect against?
ID badges
Polymorphic
SYN attacks
Black hat
18. Which of the following includes a photo and can be used for identification?
Buffer overflow
Vulnerability scanner
Polymorphic
CAC
19. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
IPSec
Command injection
Man-in-the-middle
Deny all
20. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Shoulder surfing
Vishing
Hot and cold aisles
Pharming - Logic bomb
21. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Ensure a proper chain of custody
Load balancer
SSH
IPSec
22. What port does the Domain Name Service (DNS) use by default?
Social Engineering attack
ACLs
MAC
53
23. Used in conjunction which of the following are PII?
Birthday - Full name
Gas
Least privilege
25
24. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
To minimize the organizational risk posed by users
quantitative risk assessment
ID badges
Blind FTP
25. With which of the following is RAID MOST concerned?
Availability
MAC
The development team is transferring data to test systems using SFTP and SCP.
Mandated security configurations have been made to the operating system.
26. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
DAC
MAC address
Enact a policy banning users from bringing in personal music devices.
Tailgating
27. Which of the following BEST explains the security benefit of a standardized server image?
ID badges
Mandated security configurations have been made to the operating system.
IPv6
NIPS is blocking activities from those specific websites.
28. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
ACLs
Algorithm
Fault tolerance
WPA2
29. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Least privilege
IDEA and TripleDes
Humidity
30. How does a NAT server help protect your network?
By masking the IP address of internal computers from the Internet
Vulnerability scanning
Video surveillance
Whaling
31. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?
Shielding
Vulnerability scanner
Initial vector
Hardware RAID 5 - Software RAID 1
32. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Security guard - Proximity reader
A worm is self-replicating
Hardware RAID 5 - Software RAID 1
ID badges
33. In which of the following locations would a forensic analyst look to find a hooked process?
Cross-site scripting
BIOS
Physical control of the data
Separation of duties
34. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Initial vector
Humidity
Firewall rulesflow of network traffic at the edge of the network
Software as a Service (SaaS)
35. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
MD5
Least privilege
The web site's public key.
Before and after the imaging process and then hash the forensic image
36. Which of the following is MOST likely to be the last rule contained on any firewall?
Hierarchical list of critical systems
Mantrap
NIPS is blocking activities from those specific websites.
Implicit deny
37. What key is used to encrypt an HTTPS session?
DMZ
Symmetric
Symmetric Key
TLS
38. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Humidity
Shielding
extremely slow and numerous antivirus alerts
25
39. Which of the following is a technique designed to obtain information from a specific person?
Spear phishing
DNS spoofing
Mandatory vacation
Disable unused ports
40. Which of the following are the default ports for HTTP and HTTPS protocols?
DMZ
Use SSH to connect to the Linux shell
Trojans
80 - 443
41. MAC filtering is a form of which of the following?
Network Access Control
IDS
CCTV
WPA2
42. Which of the following should be performed on a computer to protect the operating system from malicious software?
Disable unused services - Update HIPS signatures
Visibility - Accessibility - Neighborhood crime rate
NIDS
22
43. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
Mantraps
Video surveillance
DAC
MS-CHAP
44. Which of the following BEST describes the proper method and reason to implement port security?
Protocol analyzer
To ensure that staff understands what data they are handling and processing
Mantrap
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
45. Which of the following manages peer authentication and key exchange for an IPSec connection?
Software as a Service (SaaS)
Provider cloud
DAC
IKE
46. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Vulnerability scanner
Baseline reporting
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
EMI shielding
47. What is the advantage of using application virtualization?
Vulnerability scan
Business impact analysis
Lets you minimize the attack surface relating to the application
User rights and permissions reviews
48. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
80 - 443
Ensure a proper chain of custody
Spear phishing
The PC has become part of a botnet.
49. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
WPA2
AC filtering - Disabled SSID broadcast
System A fails open. System B fails closed.
Footprinting
50. Which of the following identifies some of the running services on a system?
To minimize the organizational risk posed by users
To provide documentation as to who has handled the evidence
Proxies
Determine open ports