SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Deny all
MAC filtering
Gas
Organize data based on severity and asset value.
2. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Tailgating
Buffer overflow
ICMP
MAC filtering
3. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
NOOP instructions
EMI shielding
Network Access Control
IPv6
4. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
To minimize the organizational risk posed by users
content inspection.
Buffer overflow
Network Access Control
5. Which of the following is the BEST way to secure data for the purpose of retention?
Dumpster diving - Shoulder surfing
SNMP (also use to monitor the parameters of network devices)
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Off-site backup
6. Which of the following is used when performing a qualitative risk analysis?
Validate input to remove hypertext
IKE
Judgment
signing of a user agreement.
7. Which of the following functions is MOST likely performed by a web security gateway?
Content filtering
Data Encryption Standard (DES)
Mandated security configurations have been made to the operating system.
System A fails open. System B fails closed.
8. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Block port 23 on the network firewall.
Least privilege
mitigation - acceptance - transference
Decrease the power levels on the WAP
10. Performing routine security audits is a form of which of the following controls?
Whaling
Detective
System A fails open. System B fails closed.
Network Access Control
11. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
Before and after the imaging process and then hash the forensic image
Social Engineering attack
Rogue access point
Software as a Service
12. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Risk transference
Risk assessmentproduct Answer: D
Mandatory vacation
Data Encryption Standard (DES)
13. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Firewall - VPN
Shielding
Steganography
MAC
14. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
Disable unused services - Update HIPS signatures
IPv6
SSH
Detective
15. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
25
S/MIME PGP
SYN attacks
BIOS
16. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
Accountability
S/MIME PGP
Confidentiality - Availability
MAC
17. Which of the following are the default ports for HTTP and HTTPS protocols?
The development team is transferring data to test systems using SFTP and SCP.
PEAP-TLS
80 - 443
content inspection.
18. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
Platform as a Service
War driving
The web site's private key.
Run the image through SHA256. Answer: D
19. Webmail is classified under which of the following cloud-based technologies?
User rights
Software as a Service (SaaS)
Provider cloud
Spear phishing
20. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
1433
Asset value
Visibility - Accessibility - Neighborhood crime rate
Business impact analysis
21. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Fiber optic
Confidentiality - Availability
Fault tolerance
Botnet
22. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
Hardware RAID 5 - Software RAID 1
25
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Risk assessmentproduct Answer: D
23. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
White box
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Humidity
Baseline reporting
24. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Mandatory vacations
Baseline reporting
Implicit deny
IDS
25. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?
Vulnerability scanner
The PC has become part of a botnet.
Forward to different RDP listening ports.
Disable unused services - Update HIPS signatures
26. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
The PC has become part of a botnet.
Least privilege
Shielding
Privilege escalation
27. Which of the following is the MOST secure method of utilizing FTP?
Polymorphic
FTPS
Cross-site scripting
Mandatory vacation
28. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
DoS
Social Engineering attack
Loop protection
SYN attacks
29. Which of the following is a best practice when securing a switch from physical access?
Disable unused ports
Fraud
Software as a Service
Validate input to remove hypertext
30. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
Rogue access point
Symmetric
Man-in-the-middle
Mantraps
31. Which of the following assists in identifying if a system was properly handled during transport?
Baseline reporting
Chain of custody
Blind FTP
Rootkit
32. Which of the following is the BEST choice for encryption on a wireless network?
Rogue access point
WPA2-PSK
Memory - network processes - and system processesserver. If the computer is powered off
Phishing techniques
33. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
EMI shielding
IPSec
MAC address
Rootkit
34. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
Phishing techniques
HSM
User rights
Command injection
35. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Separation of duties
Deny all
Detective
Algorithm
36. Which of the following encryption algorithms can be used in PGP for data encryption?
NIDS
SSL
IDEA and TripleDes
Cross-site scripting
37. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
Fault tolerance
53
Proxies
TLS
38. Which of the following would need to be configured correctly to allow remote access to the network?
ACLs
Integrity and Authentication
Organize data based on severity and asset value.
The development team is transferring data to test systems using SFTP and SCP.
39. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
Integrity
Video surveillance
MD5
Algorithm
40. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
Clean desk policy
Configure the IE popup blockers
Determine the potential monetary costs related to a threat
TPM
41. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Cognitive passwords
MAC
Having the offsite location of tapes also be the hot siteservers
Humidity
42. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Vulnerability scan
53
AES and TKIP
Implement a change management strategy
43. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
SSH
IPSec
Blind FTP
Mantraps
44. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Tailgating
Implement a change management strategy
Mantraps
Rogue access points
45. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
To minimize the organizational risk posed by users
Ensure a proper chain of custody
White box
80 - 443
46. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
Integrity
Only the message data is encrypted
Virtual servers have the same information security requirements as physical servers.
A system that stops an attack in progress.
47. Which of the following BEST explains the security benefit of a standardized server image?
Asymmetric and Hashing
Use SSH to connect to the Linux shell
WPA2
Mandated security configurations have been made to the operating system.
48. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
Mandatory vacations
Change Management System
Segmentation of each wireless user from other wireless users
Logic Bomb
49. Which of the following is used when performing a quantitative risk analysis?
NIDS
Smurf attack
Hot and cold aisles
Asset value
50. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
WPA Enterprise
Chain of custody
Implicit deny
Privilege escalation