SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is NOT an application layer security protocol?
IPSec
CAC
Polymorphic
WPA2-PSK
2. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
VPN concentrator
HSM
Bluesnarfing
CCTV
3. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
Video surveillance
Memory - network processes - and system processesserver. If the computer is powered off
VLAN segregation
smurf attacks
4. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
Blind FTP
Add input validation to forms.
To provide documentation as to who has handled the evidence
Rogue access point
5. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
Availability
Change Management System
Steganography
ARP poisoning
6. On-going annual awareness security training should be coupled with:..
signing of a user agreement.
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Install a network-based IDS
Clean desk policy
7. Which of the following is a best practice when securing a switch from physical access?
User rights and permissions reviews
Use SSH to connect to the Linux shell
Software as a Service (SaaS)
Disable unused ports
8. Which of the following is true regarding the WTLS protocol?
IPSec
It is used to provide data encryption for WAP connections.
Privacy policy
Clean desk policy
9. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
VLAN
Change Management System
Run the image through SHA256. Answer: D
Social Engineering attack
10. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
EMI shielding
Blind FTP
VLAN segregation
Security guard - Proximity reader
11. Which of the following is specific to a buffer overflow attack?
IDEA and TripleDes
Risk assessmentproduct Answer: D
Initial vector
Judgment
12. Which of the following will provide the HIGHEST level of wireless network security?
CAC
WPA2
Software as a Service (SaaS)
AES and TKIP
13. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
Fault tolerance
Software as a Service
Integrity
Bluesnarfing
14. Which of the following is not an asymmetric system?
DES
Symmetric Key
Man-in-the-middle
Risk assessmentproduct Answer: D
15. MAC filtering is a form of which of the following?
Network Access Control
Cognitive passwords
Whaling
25
16. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
CCTV
Hot and cold aisles
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Principle of least privilege
17. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
53
Clustering
User rights
ARP poisoning
18. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
AES and TKIP
The development team is transferring data to test systems using SFTP and SCP.
DNS spoofing
Privacy policy
19. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
DNS spoofing
Smurf attack
Multi-factor authentication.
extremely slow and numerous antivirus alerts
20. Which of the following is the BEST choice for encryption on a wireless network?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Initial vector
WPA2-PSK
Spear phishing
21. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
To minimize the organizational risk posed by users
Add input validation to forms.
Buffer overflow
Decrease the power levels on the WAP
22. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Cross-site scripting
Provider cloud
The user's PC is missing the authentication agent.
SSH
23. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
System A fails open. System B fails closed.
Account disablement
Before and after the imaging process and then hash the forensic image
User rights and permissions reviews
24. Which of the following protocols requires the use of a CA based authentication process?
A worm is self-replicating
PEAP-TLS
SNMP (also use to monitor the parameters of network devices)
Memory - network processes - and system processesserver. If the computer is powered off
25. Which of the following is used when performing a quantitative risk analysis?
Video surveillance
Asset value
DNS spoofing
Availability
26. Which of the following should be performed on a computer to protect the operating system from malicious software?
Disable unused services - Update HIPS signatures
Availability
IPSec
Shoulder surfing
27. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
BIOS
Gas
PEAP-TLS
TCP SYN flood attack
28. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
Visibility - Accessibility - Neighborhood crime rate
Risk transference
Symmetric Key
MS-CHAP
29. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
IKE
Organize data based on severity and asset value.
Integrity and Authentication
Vulnerability scan
30. Which of the following is an unauthorized wireless router that allows access to a secure network?
EMI shielding
Trojans
Rogue access point
BIOS
31. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
Privacy policy
Confidentiality
The remote router has ICMP blocked.
Implicit deny
32. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
Mandatory vacations
The user's PC is missing the authentication agent.
Business impact analysis
Integrity and Authentication
33. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
ARP poisoning
Having the offsite location of tapes also be the hot siteservers
The PC has become part of a botnet.
To ensure that staff understands what data they are handling and processing
34. Upper management decides which risk to mitigate based on cost. This is an example of:
Decrease the power levels on the WAP
Disable unused ports
quantitative risk assessment
Evil twin
35. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
ICMP
WPA Enterprise
DAC
Man-in-the-middle
36. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
DAC
To ensure that staff understands what data they are handling and processing
Vulnerability scan
Evil twin
37. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
Principle of least privilege
Forward to different RDP listening ports.
Block port 23 on the network firewall.
Software as a Service
38. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
Only the message data is encrypted
NIPS is blocking activities from those specific websites.
IDEA and TripleDes
Cross-site scripting
39. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. Which of the following describes when forensic hashing should occur on a drive?
se file servers attached to an NAS system.
Before and after the imaging process and then hash the forensic image
ID badges
Validate input to remove hypertext
41. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Integrity
Dumpster diving - Shoulder surfing
Blind FTP
Detective
42. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
Fraud
Vulnerability scan
Rogue access points
Add input validation to forms.
43. Which of the following describes a passive attempt to identify weaknesses?
System A fails open. System B fails closed.
Vulnerability scanning
Account disablement
The server is missing the default gateway.
44. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Pharming - Logic bomb
Organize data based on severity and asset value.
White box
Implicit deny
45. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Validate input to remove hypertext
IDEA and TripleDes
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
46. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Rogue access point
MAC
Asset value
47. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
The new access point was mis-configured and is interfering with another nearby access point.
Rootkit
MS-CHAP
Fault tolerance
48. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
VLAN segregation
Fraud
The development team is transferring data to test systems using SFTP and SCP.
Determine open ports
49. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
Add input validation to forms.
Spear phishing
ARP poisoning
Install a network-based IDS
50. Which of the following are the default ports for HTTP and HTTPS protocols?
To provide documentation as to who has handled the evidence
Mandatory vacation
80 - 443
Shoulder surfing