SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is an unauthorized wireless router that allows access to a secure network?
Firewall rulesflow of network traffic at the edge of the network
Whaling
Vulnerability scanning
Rogue access point
2. Which of the following functions is MOST likely performed by a web security gateway?
Shielding
IDS
Only the message data is encrypted
Content filtering
3. Which of the following should be performed on a computer to protect the operating system from malicious software?
Disable unused services - Update HIPS signatures
TCP SYN flood attack
The user's PC is missing the authentication agent.
Mandatory vacations
4. Which of the following threats corresponds with an attacker targeting specific employees of a company?
WPA2-PSK
To provide documentation as to who has handled the evidence
Spear phishing
NIPS is blocking activities from those specific websites.
5. What is the advantage of using application virtualization?
Privacy policy
Lets you minimize the attack surface relating to the application
53
ACLs
6. Which of the following devices would allow a technician to view IP headers on a data packet?
Shoulder surfing
A system that stops an attack in progress.
Protocol analyzer
Spam filters
7. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. Which of the following will provide the HIGHEST level of wireless network security?
Software as a Service
WPA2
Dumpster diving
Spear phishing
9. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?
Asymmetric and Hashing
Fault tolerance
MS-CHAP
PEAP-TLS
10. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
Hot and cold aisles
Risk transference
EMI shielding
War driving
11. What key is used to encrypt an HTTPS session?
NIDS
IPSec
Symmetric
User rights
12. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
DMZ
SNMP (also use to monitor the parameters of network devices)
IPv6
Buffer overflow
13. Performing routine security audits is a form of which of the following controls?
Detective
Dumpster diving
AES and TKIP
DMZ
14. Used in conjunction which of the following are PII?
Platform as a Service
Birthday - Full name
Use SSH to connect to the Linux shell
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
15. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Mantraps
User rights and permissions reviews
Buffer overflow
Steganography
16. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
Vulnerability scanner
DMZ
Proxies
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
17. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
Whaling
Forward to different RDP listening ports.
Network Access Control
Man-in-the-middle
18. Which of the following is the default rule found in a corporate firewall's access control list?
Multi-factor authentication.
WPA2-PSK
Deny all
Vulnerability scanner
19. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
By masking the IP address of internal computers from the Internet
Protocol analyzer
Man-in-the-middle
Implicit deny
20. Separating of duties is valuable in deterring?
Lets you minimize the attack surface relating to the application
Risk assessmentproduct Answer: D
To minimize the organizational risk posed by users
Fraud
21. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?
CAC
Social Engineering attack
Vulnerability scanner
Account disablement
22. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
DES
Off-site backup
Account disablement
Integrity
23. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Dumpster diving - Shoulder surfing
Detective
1433
Baseline reporting
24. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
IPSec
Spam filters
Information disclosure
S/MIME PGP
25. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?
Segmentation of each wireless user from other wireless users
War driving
Determine open ports
Loop protection
26. Which of the following logical controls does a flood guard protect against?
SYN attacks
Implicit deny
Firewall rulesflow of network traffic at the edge of the network
Privacy policy
27. Which of the following is the BEST way to secure data for the purpose of retention?
Off-site backup
Install a network-based IDS
User rights
ACLs
28. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
IPv6
VLAN segregation
Blind FTP
Determine open ports
29. Which of the following is a best practice when securing a switch from physical access?
Configure the IE popup blockers
Phishing techniques
Disable unused ports
Mandated security configurations have been made to the operating system.
30. Which of the following manages peer authentication and key exchange for an IPSec connection?
DMZ
WPA2-PSK
IKE
Forward to different RDP listening ports.
31. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Implicit deny
53
Clean desk policy
Baseline reporting
32. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
1433
Blind FTP
Gas
SNMP (also use to monitor the parameters of network devices)
33. Which of the following describes a passive attempt to identify weaknesses?
Vulnerability scanning
SSH
Whaling
Spear phishing
34. Which of the following facilitates computing for heavily utilized systems and networks?
se file servers attached to an NAS system.
Ensure a proper chain of custody
Provider cloud
Clustering
35. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Logic Bomb
DES
DMZ
Humidity
36. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
VLAN
Physical control of the data
IPSec
Vulnerability scanning
38. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Video surveillance
Enact a policy banning users from bringing in personal music devices.
Fraud
Whaling
39. What port does the Domain Name Service (DNS) use by default?
Network Access Control
Firewall rulesflow of network traffic at the edge of the network
Privacy policy
53
40. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Organize data based on severity and asset value.
Confidentiality - Availability
Firewall - VPN
Cross-site scripting
41. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Evil twin
Tailgating
Mantraps
Integrity
42. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
SSH
Initial vector
Asymmetric and Hashing
43. What allows for all activities on a network or system to be traced to the user who performed them?
Accountability
Decrease the power levels on the WAP
To provide documentation as to who has handled the evidence
Visibility - Accessibility - Neighborhood crime rate
44. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
Firewall - VPN
Confidentiality
ACLs
Gas
45. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
Smurf attack
Rogue access points
MAC address
Fault tolerance
46. What are typical elements of authentication as part of physical access controls?
ID badges
MAC
The development team is transferring data to test systems using SFTP and SCP.
Virtual servers have the same information security requirements as physical servers.
47. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Hot and cold aisles
Principle of least privilege
Firewall rulesflow of network traffic at the edge of the network
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
48. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
Shielding
ARP poisoning
Information disclosure
Smurf attack
49. Which of the following is specific to a buffer overflow attack?
To minimize the organizational risk posed by users
Command injection
Vulnerability scanning
Initial vector
50. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Rogue access points
Smurf attack
The development team is transferring data to test systems using SFTP and SCP.
Load balancer