SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
Hot and cold aisles
NOOP instructions
Black hat
User rights
2. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
Integrity
Privilege escalation
White box
NIDS
3. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
Account disablement
Risk assessmentproduct Answer: D
Separation of duties
The user's PC is missing the authentication agent.
4. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?
Pharming - Logic bomb
Phishing techniques
Social Engineering attack
ICMP
5. The detection of a NOOP sled is an indication of which of the following attacks?
Security guard - Proximity reader
Vishing
mitigation - acceptance - transference
Buffer overflow
6. Which of the following allows a security administrator to set device traps?
Protocol analyzer
Chain of custody
SNMP (also use to monitor the parameters of network devices)
Whaling
7. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
EMI shielding
Cognitive passwords
VLAN segregation
Having the offsite location of tapes also be the hot siteservers
8. Upper management decides which risk to mitigate based on cost. This is an example of:
IDEA and TripleDes
Man-in-the-middle
Humidity
quantitative risk assessment
9. Which of the following describes a passive attempt to identify weaknesses?
25
Vulnerability scanning
IPSec
Vishing
10. Which of the following will provide the HIGHEST level of wireless network security?
WPA2
Implicit deny
Steganography
Vulnerability scan
11. A system administrator could have a user level account and an administrator account to prevent:...
escalation of privileges.
25
Gas
Birthday - Full name
12. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?
Availability
Fault tolerance
Pharming - Logic bomb
ACLs
13. MAC filtering is a form of which of the following?
Algorithm
Network Access Control
Validate input to remove hypertext
Ensure a proper chain of custody
14. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
ACLs
War driving
Pharming - Logic bomb
DMZ
15. Used in conjunction which of the following are PII?
25
Birthday - Full name
Segmentation of each wireless user from other wireless users
ARP poisoning
16. What is the advantage of using application virtualization?
Lets you minimize the attack surface relating to the application
Symmetric Key
NOOP instructions
Vulnerability scanning
17. A company that purchases insurance to reduce risk is an example of which of the following?
SSH
Risk transference
Rootkit
Check if relaying is denied for unauthorized domains
18. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
Humidity
Tailgating
VPN concentrator
War driving
19. For which of the following is centralized key management most complicated?
Symmetric Key
Physical control of the data
The server is missing the default gateway.
Install a network-based IDS
20. Which of the following includes a photo and can be used for identification?
Disable unused services - Update HIPS signatures
Memory - network processes - and system processesserver. If the computer is powered off
CAC
Risk assessmentproduct Answer: D
21. Which of the following is the BEST choice for encryption on a wireless network?
WPA2-PSK
IPSec
Software as a Service
Validate input to remove hypertext
22. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
Social Engineering attack
escalation of privileges.
The web site's private key.
Symmetric Key
23. Which of the following is a technique designed to obtain information from a specific person?
Validate input to remove hypertext
The server is missing the default gateway.
Spear phishing
A worm is self-replicating
24. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
DMZ
IPSec
Block port 23 on the network firewall.
ID badges
25. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
IDEA and TripleDes
NIPS is blocking activities from those specific websites.
Principle of least privilege
Birthday - Full name
26. Which of the following is used when performing a quantitative risk analysis?
Asset value
Power levels
Load balancer
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
27. Which of the following BEST describes an intrusion prevention system?
A system that stops an attack in progress.
MAC
IPSec
By masking the IP address of internal computers from the Internet
28. Which of the following is NOT an application layer security protocol?
Logic Bomb
Disable unused ports
IPSec
Implement a change management strategy
29. Which of the following can prevent an unauthorized employee from entering a data center?
Security guard - Proximity reader
SSH
DMZ
Dumpster diving - Shoulder surfing
30. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
Baseline reporting
VLAN
CCTV
Accountability
31. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
AC filtering - Disabled SSID broadcast
IDS
EMI shielding
Run the image through SHA256. Answer: D
32. How does a NAT server help protect your network?
Deny all
By masking the IP address of internal computers from the Internet
Gas
Polymorphic
33. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
Privilege escalation
VLAN
Man-in-the-middle
Software as a Service
34. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
extremely slow and numerous antivirus alerts
VLAN
MD5
The remote router has ICMP blocked.
35. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Off-site backup
Platform as a Service
S/MIME PGP
36. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
Location that meets power and connectivity requirementsdatacenter
User rights and permissions reviews
Algorithm
The web site's private key.
37. Which of the following BEST explains the security benefit of a standardized server image?
Configure the IE popup blockers
Mandated security configurations have been made to the operating system.
Before and after the imaging process and then hash the forensic image
Disable unused ports
38. With which of the following is RAID MOST concerned?
22
Buffer overflow
ACLs
Availability
39. Which of the following environmental variables reduces the potential for static discharges?
Software as a Service (SaaS)
1433
Humidity
Symmetric Key
40. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
TPM
PEAP-TLS
Run the image through SHA256. Answer: D
Hierarchical list of critical systems
41. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
AC filtering - Disabled SSID broadcast
TCP SYN flood attack
Organize data based on severity and asset value.
System A fails open. System B fails closed.
42. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Protocol analyzer
Enact a policy banning users from bringing in personal music devices.
Multi-factor authentication.
Mantraps
44. Risk can be managed in the following ways...
Baseline reporting
MD5
VLAN segregation
mitigation - acceptance - transference
45. Which environmental control is part of TEMPEST compliance?
Smurf attack
80 - 443
Having the offsite location of tapes also be the hot siteservers
Shielding
46. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
1433
BIOS
Information disclosure
Least privilege
47. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Spear phishing
MAC
The new access point was mis-configured and is interfering with another nearby access point.
Block port 23 on the network firewall.
48. Performing routine security audits is a form of which of the following controls?
Firewall - VPN
Shoulder surfing
smurf attacks
Detective
49. Which of the following MUST a programmer implement to prevent cross-site scripting?
mitigation - acceptance - transference
DNS spoofing
Validate input to remove hypertext
War driving
50. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Fiber optic
WPA Enterprise
Cross-site scripting
Mandatory vacation