SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following attacks would password masking help mitigate?
IPSec
Change Management System
Shoulder surfing
The server is missing the default gateway.
2. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
IPv6
Disable unused ports
Dumpster diving
Availability
3. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Visibility - Accessibility - Neighborhood crime rate
Pharming - Logic bomb
Tailgating
MAC filtering
4. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
The development team is transferring data to test systems using SFTP and SCP.
The user's PC is missing the authentication agent.
By masking the IP address of internal computers from the Internet
Fault tolerance
5. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
Memory - network processes - and system processesserver. If the computer is powered off
Asset value
Integrity
Algorithm
6. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
ICMP
NIDS
Gas
Only the message data is encrypted
7. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
BIOS
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Segmentation of each wireless user from other wireless users
Blind FTP
8. Which of the following concepts ensures that the data is only viewable to authorized users?
Black hat
Configure the IE popup blockers
ARP poisoning
Confidentiality
9. Which of the following should NOT be used with username/password authentication?
Implicit deny
Cognitive passwords
Virtual servers have the same information security requirements as physical servers.
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
10. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
DAC
DNS spoofing
User rights
Privilege escalation
11. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
AC filtering - Disabled SSID broadcast
Mantrap
TLS
ID badges
12. With which of the following is RAID MOST concerned?
Availability
Smurf attack
Loop protection
Initial vector
13. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Humidity
Steganography
Use SSH to connect to the Linux shell
NIPS is blocking activities from those specific websites.
14. Risk can be managed in the following ways...
Trojans
mitigation - acceptance - transference
Symmetric Key
Determine open ports
15. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Buffer overflow
ID badges
Symmetric
DNS spoofing
16. Which of the following reduces the likelihood of a single point of failure when a server fails?
Multi-factor authentication.
To minimize the organizational risk posed by users
The development team is transferring data to test systems using SFTP and SCP.
Clustering
17. Which of the following can prevent an unauthorized employee from entering a data center?
Security guard - Proximity reader
Baseline reporting
DES
Block port 23 on the network firewall.
18. Which of the following is the MAIN reason to require data labeling?
Having the offsite location of tapes also be the hot siteservers
Software as a Service
Risk assessmentproduct Answer: D
To ensure that staff understands what data they are handling and processing
19. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Symmetric Key
Vulnerability scanner
Confidentiality
Blind FTP
20. Which of the following is specific to a buffer overflow attack?
Having the offsite location of tapes also be the hot siteservers
Symmetric Key
Initial vector
Proxies
21. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
Command injection
Platform as a Service
War driving
Video surveillance
22. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Software as a Service
NOOP instructions
Confidentiality
Cross-site scripting
23. Which of the following allows a security administrator to set device traps?
SNMP (also use to monitor the parameters of network devices)
Command injection
MS-CHAP
Dumpster diving - Shoulder surfing
24. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
To minimize the organizational risk posed by users
Physical control of the data
User rights and permissions reviews
The remote router has ICMP blocked.
25. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?
Install a network-based IDS
Physical control of the data
Bluesnarfing
Decrease the power levels on the WAP
26. Which of the following is a reason to perform user awareness and training?
Network Access Control
To minimize the organizational risk posed by users
Risk assessmentproduct Answer: D
Mandated security configurations have been made to the operating system.
27. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Mandatory vacation
The user's PC is missing the authentication agent.
Security guard - Proximity reader
Asymmetric and Hashing
28. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
Gas
Having the offsite location of tapes also be the hot siteservers
Physical control of the data
SSL
29. Which of the following describes when forensic hashing should occur on a drive?
Before and after the imaging process and then hash the forensic image
Symmetric
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Video surveillance
30. DRPs should contain which of the following?
Hierarchical list of critical systems
BIOS
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Steganography
31. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
To ensure that staff understands what data they are handling and processing
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Hardware RAID 5 - Software RAID 1
IDEA and TripleDes
32. Which of the following is used when performing a qualitative risk analysis?
Asymmetric and Hashing
Multi-factor authentication.
NIDS
Judgment
33. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Cross-site scripting
Vulnerability scan
Principle of least privilege
IPSec
34. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
Decrease the power levels on the WAP
Algorithm
Integrity and Authentication
Mandatory vacations
35. Which of the following is a best practice when securing a switch from physical access?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Algorithm
Disable unused ports
WPA2-PSK
36. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
TCP SYN flood attack
WPA2
Symmetric Key
25
37. Which of the following devices is often used to cache and filter content?
Proxies
DAC
Spear phishing
Chain of custody
38. Which of the following is the primary difference between a virus and a worm?
IPSec
Validate input to remove hypertext
A worm is self-replicating
User rights
39. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
Humidity
To provide documentation as to who has handled the evidence
Cross-site scripting
HSM
40. Which of the following is the BEST way to secure data for the purpose of retention?
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Loop protection
DMZ
Off-site backup
41. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
Check if relaying is denied for unauthorized domains
NIDS
Software as a Service (SaaS)
Block port 23 on the network firewall.
42. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
ICMP
Vulnerability scan
PEAP-TLS
Only the message data is encrypted
43. Which of the following is true concerning email message encryption by using S/MIME?
Only the message data is encrypted
Account disablement
White box
IKE
44. Which of the following access control models allows classification and labeling of objects?
Mandated security configurations have been made to the operating system.
SYN attacks
Hardware RAID 5 - Software RAID 1
MAC
45. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
Baseline reporting
The remote router has ICMP blocked.
IDS
A worm is self-replicating
46. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
The web site's public key.
Least privilege
Rootkit
VPN concentrator
47. Webmail is classified under which of the following cloud-based technologies?
Block port 23 on the network firewall.
Software as a Service (SaaS)
Cognitive passwords
The user's PC is missing the authentication agent.
48. What is the advantage of using application virtualization?
White box
System A fails open. System B fails closed.
Bluesnarfing
Lets you minimize the attack surface relating to the application
49. Which of the following functions is MOST likely performed by a web security gateway?
Content filtering
Decrease the power levels on the WAP
Mandatory vacation
Disable unused ports
50. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Privilege escalation
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Off-site backup
Black hat