SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
The remote router has ICMP blocked.
NIDS
Only the message data is encrypted
Privilege escalation
2. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
TPM
NOOP instructions
S/MIME PGP
IPSec
3. Performing routine security audits is a form of which of the following controls?
Detective
Vulnerability scanning
The new access point was mis-configured and is interfering with another nearby access point.
Determine the potential monetary costs related to a threat
4. Separating of duties is valuable in deterring?
Trojans
Man-in-the-middle
Fraud
Determine open ports
5. MAC filtering is a form of which of the following?
Trojans
Spam filters
Network Access Control
Multi-factor authentication.
6. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
Whaling
DMZ
Hot and cold aisles
Cross-site scripting
7. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Use SSH to connect to the Linux shell
Data Encryption Standard (DES)
Account disablement
NIDS
8. Which of the following facilitates computing for heavily utilized systems and networks?
The development team is transferring data to test systems using SFTP and SCP.
Determine the potential monetary costs related to a threat
Provider cloud
extremely slow and numerous antivirus alerts
9. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
ICMP
Mandated security configurations have been made to the operating system.
Confidentiality
Ensure a proper chain of custody
10. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
DES
Load balancer
ID badges
Software as a Service (SaaS)
11. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
User rights
Social Engineering attack
DMZ
By masking the IP address of internal computers from the Internet
12. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
ID badges
NIDS
Rogue access points
VLAN
13. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Footprinting
Algorithm
MD5
14. Isolation mode on an AP provides which of the following functionality types?
53
NIDS
Segmentation of each wireless user from other wireless users
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
15. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
Whaling
Firewall - VPN
Trojans
NOOP instructions
16. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
To provide documentation as to who has handled the evidence
Add input validation to forms.
White box
Platform as a Service
17. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Asymmetric and Hashing
Command injection
Determine open ports
Multi-factor authentication.
18. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
Visibility - Accessibility - Neighborhood crime rate
ID badges
1433
BIOS
19. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
Off-site backup
Information disclosure
Baseline reporting
Symmetric
20. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
Separation of duties
Phishing techniques
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
The server is missing the default gateway.
21. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
Business impact analysis
MAC
To provide documentation as to who has handled the evidence
Security guard - Proximity reader
22. Risk can be managed in the following ways...
mitigation - acceptance - transference
Cross-site scripting
Mantraps
War driving
23. You are performing risk assessment for an organization. What should you do during impact assessment?
Integrity
DMZ
Determine the potential monetary costs related to a threat
Buffer overflow
24. Which of the following is NOT an application layer security protocol?
Determine the potential monetary costs related to a threat
IPSec
Security guard - Proximity reader
MAC
25. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
ARP poisoning
Implicit deny
Location that meets power and connectivity requirementsdatacenter
A worm is self-replicating
26. Which of the following describes when forensic hashing should occur on a drive?
Mandatory vacations
Cognitive passwords
Principle of least privilege
Before and after the imaging process and then hash the forensic image
27. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
Spam filters
Change Management System
Account disablement
Judgment
28. In which of the following locations would a forensic analyst look to find a hooked process?
Buffer overflow
Check if relaying is denied for unauthorized domains
BIOS
Mantraps
29. Which of the following is MOST relevant to a buffer overflow attack?
NOOP instructions
Firewall - VPN
Mantrap
Having the offsite location of tapes also be the hot siteservers
30. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Confidentiality
signing of a user agreement.
Privilege escalation
Firewall - VPN
31. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
SNMP (also use to monitor the parameters of network devices)
EMI shielding
Symmetric
Mantrap
32. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
The new access point was mis-configured and is interfering with another nearby access point.
Privacy policy
Proxies
Blind FTP
33. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Algorithm
CCTV
Fiber optic
HSM
34. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Asymmetric and Hashing
Cross-site scripting
WPA Enterprise
It is used to provide data encryption for WAP connections.
35. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
FTPS
Power levels
DNS spoofing
The web site's private key.
36. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
Run the image through SHA256. Answer: D
The remote router has ICMP blocked.
Ensure a proper chain of custody
Privilege escalation
37. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
Forward to different RDP listening ports.
The PC has become part of a botnet.
AC filtering - Disabled SSID broadcast
TCP SYN flood attack
38. Which of the following allows a security administrator to set device traps?
Algorithm
Initial vector
SNMP (also use to monitor the parameters of network devices)
FTPS
39. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
Integrity
Mantraps
MD5
WPA2
40. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
The web site's public key.
extremely slow and numerous antivirus alerts
Disable unused services - Update HIPS signatures
User rights
41. Which of the following manages peer authentication and key exchange for an IPSec connection?
Vulnerability scanner
Fraud
IKE
SYN attacks
42. Which of the following is a detective security control?
S/MIME PGP
Blind FTP
CCTV
Mandatory vacation
43. Which of the following uses TCP port 22 by default?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Clean desk policy
Multi-factor authentication.
Risk transference
44. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
Hot and cold aisles
Principle of least privilege
DMZ
Gas
45. Which of the following MUST a programmer implement to prevent cross-site scripting?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Use SSH to connect to the Linux shell
Validate input to remove hypertext
It is used to provide data encryption for WAP connections.
46. Which of the following BEST describes an intrusion prevention system?
A system that stops an attack in progress.
Mantrap
Cross-site scripting
It is used to provide data encryption for WAP connections.
47. Which of the following devices is often used to cache and filter content?
SSH
Change Management System
Proxies
Fault tolerance
48. Which of the following is not an asymmetric system?
Vulnerability scanning
DES
User rights and permissions reviews
Content filtering
49. Which of the following is a technique designed to obtain information from a specific person?
Information disclosure
Hierarchical list of critical systems
Spear phishing
War driving
50. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
AES and TKIP
Organize data based on severity and asset value.
The remote router has ICMP blocked.
Determine open ports