SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Steganography
IPSec
The PC has become part of a botnet.
Confidentiality
2. Which of the following logical controls does a flood guard protect against?
Vulnerability scan
To ensure that staff understands what data they are handling and processing
Algorithm
SYN attacks
3. What asymmetric key is used to decrypt when using HTTPS?
4. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
Separation of duties
AC filtering - Disabled SSID broadcast
Clean desk policy
TCP SYN flood attack
5. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Location that meets power and connectivity requirementsdatacenter
Hot and cold aisles
PEAP-TLS
Protocol analyzer
6. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
MS-CHAP
Vulnerability scanning
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
EMI shielding
7. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Business impact analysis
Add input validation to forms.
TLS
Block port 23 on the network firewall.
8. A company that purchases insurance to reduce risk is an example of which of the following?
Dumpster diving
Risk transference
Buffer overflow
Clustering
9. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
TCP SYN flood attack
Command injection
Protocol analyzer
CCTV
10. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
Judgment
Shoulder surfing
MS-CHAP
Content filtering
11. Which of the following is a detective security control?
Firewall - VPN
Before and after the imaging process and then hash the forensic image
Buffer overflow
CCTV
12. Which of the following is specific to a buffer overflow attack?
Block port 23 on the network firewall.
Confidentiality
Cross-site scripting
Initial vector
13. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Steganography
Software as a Service
IPSec
Dumpster diving - Shoulder surfing
14. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
DoS
Check if relaying is denied for unauthorized domains
Buffer overflow
The user's PC is missing the authentication agent.
15. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
Polymorphic
VLAN
It is used to provide data encryption for WAP connections.
By masking the IP address of internal computers from the Internet
16. Which of the following allows a security administrator to set device traps?
content inspection.
SNMP (also use to monitor the parameters of network devices)
Forward to different RDP listening ports.
ACLs
17. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
CAC
AC filtering - Disabled SSID broadcast
Account disablement
Availability
18. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Only the message data is encrypted
WPA2
25
By masking the IP address of internal computers from the Internet
19. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
Hardware RAID 5 - Software RAID 1
Privacy policy
The user's PC is missing the authentication agent.
1433
20. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
To ensure that staff understands what data they are handling and processing
Confidentiality
22
AC filtering - Disabled SSID broadcast
21. Which of the following describes a passive attempt to identify weaknesses?
Install a network-based IDS
Segmentation of each wireless user from other wireless users
Vulnerability scanning
Run the image through SHA256. Answer: D
22. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
Mantraps
mitigation - acceptance - transference
1433
Add input validation to forms.
23. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
Separation of duties
WPA2-PSK
MAC address
Firewall - VPN
24. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
The development team is transferring data to test systems using SFTP and SCP.
Baseline reporting
Black hat
Memory - network processes - and system processesserver. If the computer is powered off
25. Which of the following is a security control that is lost when using cloud computing?
Humidity
Physical control of the data
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Fraud
26. Which of the following is MOST likely to be the last rule contained on any firewall?
Check if relaying is denied for unauthorized domains
Enact a policy banning users from bringing in personal music devices.
MAC
Implicit deny
27. Which of the following manages peer authentication and key exchange for an IPSec connection?
IKE
CCTV
Fiber optic
The web site's public key.
28. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
22
Rogue access points
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Physical control of the data
29. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
Trojans
Memory - network processes - and system processesserver. If the computer is powered off
Vishing
Block port 23 on the network firewall.
30. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Vulnerability scan
NOOP instructions
User rights and permissions reviews
Tailgating
31. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
To provide documentation as to who has handled the evidence
MAC
Pharming - Logic bomb
Validate input to remove hypertext
32. Which of the following is an unauthorized wireless router that allows access to a secure network?
Ensure a proper chain of custody
IKE
FTPS
Rogue access point
33. Which of the following should NOT be used with username/password authentication?
Having the offsite location of tapes also be the hot siteservers
Cognitive passwords
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Birthday - Full name
34. Which of the following MUST a programmer implement to prevent cross-site scripting?
Validate input to remove hypertext
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
IKE
Check if relaying is denied for unauthorized domains
35. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Virtual servers have the same information security requirements as physical servers.
Algorithm
Enact a policy banning users from bringing in personal music devices.
Rogue access points
36. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
Mantraps
Integrity
Content filtering
Software as a Service
37. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
VLAN segregation
DoS
MAC
The server is missing the default gateway.
38. Which of the following encryption algorithms can be used in PGP for data encryption?
IDEA and TripleDes
Rootkit
To provide documentation as to who has handled the evidence
Configure the IE popup blockers
39. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
Bluesnarfing
CCTV
extremely slow and numerous antivirus alerts
Principle of least privilege
40. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?
Accountability
Diffie-Hellman
Platform as a Service
Change Management System
41. Which of the following is not an asymmetric system?
The development team is transferring data to test systems using SFTP and SCP.
FTPS
Information disclosure
DES
42. Which of the following is the MAIN reason to require data labeling?
Tailgating
Man-in-the-middle
To ensure that staff understands what data they are handling and processing
S/MIME PGP
43. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
Implement a change management strategy
War driving
Mandated security configurations have been made to the operating system.
ARP poisoning
44. Actively monitoring data streams in search of malicious code or behavior is an example of..
Location that meets power and connectivity requirementsdatacenter
Shoulder surfing
content inspection.
SSH
45. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Blind FTP
Birthday - Full name
Evil twin
Loop protection
46. Which of the following attacks would password masking help mitigate?
NIPS is blocking activities from those specific websites.
Shoulder surfing
White box
content inspection.
47. Which of the following is a best practice when securing a switch from physical access?
Load balancer
Lets you minimize the attack surface relating to the application
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Disable unused ports
48. Which of the following can prevent an unauthorized employee from entering a data center?
Steganography
Security guard - Proximity reader
22
NIDS
49. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
Implement a change management strategy
War driving
Virtual servers have the same information security requirements as physical servers.
Configure the IE popup blockers
50. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
SSH
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Spam filters
Firewall rulesflow of network traffic at the edge of the network