SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Vulnerability scanning
Firewall rulesflow of network traffic at the edge of the network
Power levels
Memory - network processes - and system processesserver. If the computer is powered off
2. Which of the following concepts ensures that the data is only viewable to authorized users?
Polymorphic
Spam filters
Visibility - Accessibility - Neighborhood crime rate
Confidentiality
3. You are performing risk assessment for an organization. What should you do during impact assessment?
IKE
Baseline reporting
Determine the potential monetary costs related to a threat
Use SSH to connect to the Linux shell
4. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
Rogue access points
Load balancer
Visibility - Accessibility - Neighborhood crime rate
War driving
5. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
53
The development team is transferring data to test systems using SFTP and SCP.
Run the image through SHA256. Answer: D
TLS
6. Which of the following BEST describes the proper method and reason to implement port security?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
TLS
Mandated security configurations have been made to the operating system.
Content filtering
7. Which of the following is a security control that is lost when using cloud computing?
Physical control of the data
Determine the potential monetary costs related to a threat
mitigation - acceptance - transference
Mandated security configurations have been made to the operating system.
8. Which of the following can prevent an unauthorized employee from entering a data center?
FTPS
Security guard - Proximity reader
Man-in-the-middle
Diffie-Hellman
9. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
SSL
Polymorphic
IPSec
AES and TKIP
10. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
IPv6
53
Accountability
MD5
11. Which of the following is a method to prevent ad-hoc configuration mistakes?
Detective
BIOS
Implement a change management strategy
ID badges
12. Which of the following devices is often used to cache and filter content?
To ensure that staff understands what data they are handling and processing
Proxies
Data Encryption Standard (DES)
80 - 443
13. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
Judgment
EMI shielding
White box
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
14. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
DNS spoofing
Spear phishing
Memory - network processes - and system processesserver. If the computer is powered off
Rootkit
15. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Business impact analysis
ICMP
Tailgating
Vishing
16. Which of the following is a technique designed to obtain information from a specific person?
Implicit deny
Power levels
Spear phishing
Clean desk policy
17. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
Firewall - VPN
Virtual servers have the same information security requirements as physical servers.
Asset value
Location that meets power and connectivity requirementsdatacenter
18. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
Social Engineering attack
Vulnerability scanning
Risk assessmentproduct Answer: D
Privacy policy
19. Which of the following describes a passive attempt to identify weaknesses?
Software as a Service
Vulnerability scanning
Chain of custody
Humidity
20. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
Off-site backup
IPSec
Privacy policy
Footprinting
21. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Provider cloud
Fraud
Confidentiality - Availability
Dumpster diving - Shoulder surfing
22. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
By masking the IP address of internal computers from the Internet
Determine open ports
White box
Data Encryption Standard (DES)
23. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Hot and cold aisles
Spear phishing
Virtual servers have the same information security requirements as physical servers.
Spam filters
24. Which of the following is a reason to perform user awareness and training?
VLAN segregation
To minimize the organizational risk posed by users
MD5
Visibility - Accessibility - Neighborhood crime rate
25. What key is used to encrypt an HTTPS session?
Symmetric
Footprinting
Rogue access point
CAC
26. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Humidity
Blind FTP
Hot and cold aisles
VLAN segregation
27. Which of the following includes a photo and can be used for identification?
CAC
War driving
MAC filtering
IPSec
28. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Tailgating
WPA Enterprise
Business impact analysis
IPSec
29. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Implicit deny
Platform as a Service
Vulnerability scanning
Humidity
30. Which of the following manages peer authentication and key exchange for an IPSec connection?
Bluesnarfing
Clustering
IKE
AES and TKIP
31. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Cross-site scripting
MAC
Pharming - Logic bomb
Asymmetric and Hashing
32. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Logic Bomb
Hot and cold aisles
Clustering
Implicit deny
33. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?
Decrease the power levels on the WAP
Mandated security configurations have been made to the operating system.
DMZ
Business impact analysis
34. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
DoS
Add input validation to forms.
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Birthday - Full name
35. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
Use SSH to connect to the Linux shell
ACLs
By masking the IP address of internal computers from the Internet
TCP SYN flood attack
36. Used in conjunction which of the following are PII?
Privilege escalation
Birthday - Full name
Rogue access point
PEAP-TLS
37. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Vulnerability scan
AC filtering - Disabled SSID broadcast
Blind FTP
Shoulder surfing
38. A system administrator could have a user level account and an administrator account to prevent:...
DNS spoofing
Power levels
escalation of privileges.
Rogue access points
39. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
EMI shielding
Birthday - Full name
Integrity
Gas
40. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Having the offsite location of tapes also be the hot siteservers
Use SSH to connect to the Linux shell
Location that meets power and connectivity requirementsdatacenter
Steganography
41. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
content inspection.
Firewall - VPN
TPM
Cross-site scripting
42. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
Software as a Service
A system that stops an attack in progress.
TPM
Cognitive passwords
43. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
Install a network-based IDS
IDS
Decrease the power levels on the WAP
Block port 23 on the network firewall.
44. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
Determine open ports
Mantraps
Multi-factor authentication.
AC filtering - Disabled SSID broadcast
45. Which of the following port numbers is used for SCP by default?
Baseline reporting
Logic Bomb
EMI shielding
22
46. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
MS-CHAP
System A fails open. System B fails closed.
Validate input to remove hypertext
The server is missing the default gateway.
47. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Platform as a Service
Firewall rulesflow of network traffic at the edge of the network
MAC
Implement a change management strategy
48. Performing routine security audits is a form of which of the following controls?
Confidentiality - Availability
Proxies
Detective
escalation of privileges.
49. Which of the following is specific to a buffer overflow attack?
Blind FTP
Buffer overflow
Initial vector
Cross-site scripting
50. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
Protocol analyzer
Evil twin
Asymmetric and Hashing
Lets you minimize the attack surface relating to the application