SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
Baseline reporting
DoS
S/MIME PGP
Ensure a proper chain of custody
2. Which of the following describes a passive attempt to identify weaknesses?
SSH
Dumpster diving
Vulnerability scanning
Footprinting
3. Webmail is classified under which of the following cloud-based technologies?
Software as a Service (SaaS)
extremely slow and numerous antivirus alerts
Software as a Service
Risk transference
4. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Botnet
80 - 443
Hardware RAID 5 - Software RAID 1
Fiber optic
5. Which of the following are the default ports for HTTP and HTTPS protocols?
80 - 443
It is used to provide data encryption for WAP connections.
Segmentation of each wireless user from other wireless users
Shielding
6. Which environmental control is part of TEMPEST compliance?
Shielding
IKE
DoS
Ensure a proper chain of custody
7. Which of the following is a technique designed to obtain information from a specific person?
Location that meets power and connectivity requirementsdatacenter
Spear phishing
The remote router has ICMP blocked.
War driving
8. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
The server is missing the default gateway.
ACLs
Confidentiality - Availability
SYN attacks
9. In which of the following locations would a forensic analyst look to find a hooked process?
BIOS
Lets you minimize the attack surface relating to the application
VPN concentrator
Virtual servers have the same information security requirements as physical servers.
10. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
NOOP instructions
Algorithm
War driving
Memory - network processes - and system processesserver. If the computer is powered off
11. Which of the following is MOST likely to be the last rule contained on any firewall?
Implicit deny
Virtual servers have the same information security requirements as physical servers.
Provider cloud
Configure the IE popup blockers
12. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
SYN attacks
MS-CHAP
MAC
Symmetric Key
13. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
Virtual servers have the same information security requirements as physical servers.
SNMP (also use to monitor the parameters of network devices)
IDS
80 - 443
14. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
Forward to different RDP listening ports.
Lets you minimize the attack surface relating to the application
To ensure that staff understands what data they are handling and processing
Vulnerability scan
15. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Accountability
Hot and cold aisles
Proxies
DES
16. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Symmetric Key
Mandated security configurations have been made to the operating system.
ICMP
Run the image through SHA256. Answer: D
17. The detection of a NOOP sled is an indication of which of the following attacks?
Disable unused ports
Social Engineering attack
25
Buffer overflow
18. Isolation mode on an AP provides which of the following functionality types?
Information disclosure
25
Segmentation of each wireless user from other wireless users
PEAP-TLS
19. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
EMI shielding
The development team is transferring data to test systems using SFTP and SCP.
Bluesnarfing
Algorithm
20. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
User rights
Implicit deny
VPN concentrator
It is used to provide data encryption for WAP connections.
21. Which of the following should be enabled to ensure only certain wireless clients can access the network?
WPA2-PSK
MAC filtering
Cross-site scripting
System A fails open. System B fails closed.
22. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Tailgating
Principle of least privilege
To minimize the organizational risk posed by users
Mandatory vacation
23. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
Add input validation to forms.
MD5
SYN attacks
IPSec
24. The 802.11i standard specifies support for which encryption algorithms?
quantitative risk assessment
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
IDS
AES and TKIP
25. Which of the following is a security control that is lost when using cloud computing?
Physical control of the data
MAC
Integrity
Tailgating
26. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
Run the image through SHA256. Answer: D
Privacy policy
Gas
SYN attacks
27. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
WPA2-PSK
Symmetric Key
Mantrap
28. Which of the following is MOST commonly a part of routine system audits?
MAC address
User rights and permissions reviews
ARP poisoning
Logic Bomb
29. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
Content filtering
Validate input to remove hypertext
IKE
Trojans
30. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Only the message data is encrypted
Validate input to remove hypertext
EMI shielding
Cross-site scripting
31. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Before and after the imaging process and then hash the forensic image
Dumpster diving - Shoulder surfing
MAC
Clustering
32. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
System A fails open. System B fails closed.
Change Management System
Evil twin
Hot and cold aisles
34. Which of the following is true regarding the WTLS protocol?
Shoulder surfing
Validate input to remove hypertext
Only the message data is encrypted
It is used to provide data encryption for WAP connections.
35. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Pharming - Logic bomb
Fiber optic
quantitative risk assessment
Symmetric Key
36. What types of encryption are used for adding a digital signature to a message?
DAC
Business impact analysis
WPA2
Asymmetric and Hashing
37. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Footprinting
Change Management System
Mandatory vacations
Confidentiality - Availability
38. Which of the following is the MOST secure method of utilizing FTP?
ID badges
Integrity
Privacy policy
FTPS
39. Which of the following assists in identifying if a system was properly handled during transport?
Fiber optic
War driving
Chain of custody
TLS
40. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
Phishing techniques
White box
FTPS
IPSec
41. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Power levels
Location that meets power and connectivity requirementsdatacenter
Trojans
42. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?
Fiber optic
Baseline reporting
Shoulder surfing
Smurf attack
43. Which of the following BEST describes an intrusion prevention system?
Implement a change management strategy
Fault tolerance
A system that stops an attack in progress.
To provide documentation as to who has handled the evidence
44. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Vulnerability scanning
Disable unused ports
Block port 23 on the network firewall.
War driving
45. Which of the following BEST describes the proper method and reason to implement port security?
Block port 23 on the network firewall.
Power levels
IPSec
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
46. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?
Loop protection
Business impact analysis
The development team is transferring data to test systems using SFTP and SCP.
Firewall rulesflow of network traffic at the edge of the network
47. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
MAC
Asymmetric and Hashing
User rights and permissions reviews
48. For which of the following is centralized key management most complicated?
Symmetric Key
IPSec
MS-CHAP
TPM
49. Which of the following functions is MOST likely performed by a web security gateway?
Content filtering
Data Encryption Standard (DES)
22
Steganography
50. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
A worm is self-replicating
User rights
extremely slow and numerous antivirus alerts
Man-in-the-middle