SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is an unauthorized wireless router that allows access to a secure network?
The web site's private key.
Configure the IE popup blockers
Rogue access point
Symmetric Key
2. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Vulnerability scan
By masking the IP address of internal computers from the Internet
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Clean desk policy
3. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Off-site backup
Integrity
Physical control of the data
Cross-site scripting
4. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
To ensure that staff understands what data they are handling and processing
Command injection
Spear phishing
Protocol analyzer
5. Which of the following is true regarding the WTLS protocol?
It is used to provide data encryption for WAP connections.
Configure the IE popup blockers
Mandated security configurations have been made to the operating system.
Least privilege
6. Which of the following risks may result from improper use of social networking and P2P software?
Vulnerability scan
Use SSH to connect to the Linux shell
Information disclosure
War driving
7. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
Before and after the imaging process and then hash the forensic image
IPv6
DMZ
To ensure that staff understands what data they are handling and processing
8. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
WPA2-PSK
Smurf attack
Privacy policy
Network Access Control
9. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
10. Which of the following logical controls does a flood guard protect against?
SYN attacks
MAC filtering
Fault tolerance
AC filtering - Disabled SSID broadcast
11. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Baseline reporting
Fraud
Trojans
Tailgating
12. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Buffer overflow
Privilege escalation
Vulnerability scanning
MAC
13. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Symmetric Key
Implicit deny
Shielding
Security guard - Proximity reader
14. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Cognitive passwords
Baseline reporting
Virtual servers have the same information security requirements as physical servers.
TPM
15. Which of the following port numbers is used for SCP by default?
Cognitive passwords
DAC
Install a network-based IDS
22
16. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
content inspection.
Firewall rulesflow of network traffic at the edge of the network
Ensure a proper chain of custody
Fault tolerance
17. Which of the following devices would allow a technician to view IP headers on a data packet?
Phishing techniques
Protocol analyzer
DMZ
Decrease the power levels on the WAP
18. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
Business impact analysis
The PC has become part of a botnet.
Check if relaying is denied for unauthorized domains
NIPS is blocking activities from those specific websites.
19. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
CAC
DoS
Implicit deny
SNMP (also use to monitor the parameters of network devices)
20. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
DoS
Shoulder surfing
Shielding
S/MIME PGP
21. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
Install a network-based IDS
ACLs
ARP poisoning
Enact a policy banning users from bringing in personal music devices.
22. What asymmetric key is used to encrypt when using HTTPS?
23. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
Tailgating
Availability
ARP poisoning
53
24. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
smurf attacks
Baseline reporting
Vulnerability scanning
Mantraps
25. Which of the following is not an asymmetric system?
content inspection.
Mandated security configurations have been made to the operating system.
Lets you minimize the attack surface relating to the application
DES
26. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
War driving
Enact a policy banning users from bringing in personal music devices.
System A fails open. System B fails closed.
A worm is self-replicating
27. Which of the following is the default rule found in a corporate firewall's access control list?
Accountability
Buffer overflow
Spam filters
Deny all
28. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
Information disclosure
IPv6
1433
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
29. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
ICMP
Mandatory vacations
Trojans
Block port 23 on the network firewall.
30. You are performing risk assessment for an organization. What should you do during impact assessment?
Virtual servers have the same information security requirements as physical servers.
Shielding
Integrity
Determine the potential monetary costs related to a threat
31. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Enact a policy banning users from bringing in personal music devices.
DMZ
Network Access Control
AES and TKIP
32. Which of the following manages peer authentication and key exchange for an IPSec connection?
Steganography
Cognitive passwords
IKE
Buffer overflow
33. Which of the following can prevent an unauthorized employee from entering a data center?
Network Access Control
Vulnerability scanner
smurf attacks
Security guard - Proximity reader
34. In which of the following locations would a forensic analyst look to find a hooked process?
Availability
The remote router has ICMP blocked.
WPA2-PSK
BIOS
35. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
Firewall rulesflow of network traffic at the edge of the network
Business impact analysis
Rogue access points
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
36. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Change Management System
extremely slow and numerous antivirus alerts
A system that stops an attack in progress.
37. A company that purchases insurance to reduce risk is an example of which of the following?
Chain of custody
Risk transference
AC filtering - Disabled SSID broadcast
Visibility - Accessibility - Neighborhood crime rate
38. Which of the following will provide the HIGHEST level of wireless network security?
Principle of least privilege
Disable unused ports
WPA2
IPv6
39. Which of the following is a management control type?
SNMP (also use to monitor the parameters of network devices)
Cross-site scripting
Vulnerability scanning
IPSec
40. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
Fiber optic
The web site's public key.
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Baseline reporting
41. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
Run the image through SHA256. Answer: D
Algorithm
Fraud
EMI shielding
42. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Implicit deny
User rights
Tailgating
Mandatory vacation
43. Which of the following security threats does shredding mitigate?
WPA Enterprise
Dumpster diving
Steganography
Integrity and Authentication
44. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
VPN concentrator
25
Privacy policy
Trojans
45. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Hot and cold aisles
Algorithm
VLAN segregation
Fraud
46. Which of the following includes a photo and can be used for identification?
Buffer overflow
The server is missing the default gateway.
Mandatory vacation
CAC
47. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
Spear phishing
VLAN
Birthday - Full name
White box
48. Which of the following facilitates computing for heavily utilized systems and networks?
Provider cloud
AES and TKIP
Before and after the imaging process and then hash the forensic image
NOOP instructions
49. Which of the following is a best practice when securing a switch from physical access?
Shoulder surfing
TCP SYN flood attack
CCTV
Disable unused ports
50. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
DMZ
WPA2-PSK
Steganography
Smurf attack