SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
ARP poisoning
TPM
Separation of duties
Gas
2. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
VLAN
Chain of custody
Vulnerability scan
TPM
3. You are performing risk assessment for an organization. What should you do during impact assessment?
Determine the potential monetary costs related to a threat
User rights and permissions reviews
Pharming - Logic bomb
Blind FTP
4. Actively monitoring data streams in search of malicious code or behavior is an example of..
content inspection.
The new access point was mis-configured and is interfering with another nearby access point.
Command injection
WPA2
5. Which of the following attacks would password masking help mitigate?
WPA Enterprise
Implement a change management strategy
Principle of least privilege
Shoulder surfing
6. Which of the following is NOT an application layer security protocol?
NOOP instructions
IPSec
Validate input to remove hypertext
Run the image through SHA256. Answer: D
7. Webmail is classified under which of the following cloud-based technologies?
A system that stops an attack in progress.
It is used to provide data encryption for WAP connections.
Software as a Service (SaaS)
MAC
8. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?
Provider cloud
Phishing techniques
DoS
VLAN
9. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Symmetric Key
Vulnerability scan
HSM
MAC filtering
10. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
NIPS is blocking activities from those specific websites.
Hardware RAID 5 - Software RAID 1
Software as a Service
Data Encryption Standard (DES)
11. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
SSL
Account disablement
War driving
Buffer overflow
12. Which of the following is the BEST choice for encryption on a wireless network?
WPA2-PSK
Deny all
Pharming - Logic bomb
Humidity
13. Which of the following logical controls does a flood guard protect against?
A worm is self-replicating
Location that meets power and connectivity requirementsdatacenter
SYN attacks
Diffie-Hellman
14. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
EMI shielding
Visibility - Accessibility - Neighborhood crime rate
Whaling
Symmetric
15. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
The remote router has ICMP blocked.
System A fails open. System B fails closed.
Load balancer
Organize data based on severity and asset value.
16. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
Black hat
Privacy policy
The development team is transferring data to test systems using SFTP and SCP.
Mandatory vacation
17. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
25
Proxies
Social Engineering attack
IDS
18. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Add input validation to forms.
Privilege escalation
extremely slow and numerous antivirus alerts
EMI shielding
19. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
Vulnerability scanning
Bluesnarfing
Fraud
smurf attacks
20. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
Phishing techniques
IPSec
Implicit deny
Organize data based on severity and asset value.
21. A system administrator could have a user level account and an administrator account to prevent:...
escalation of privileges.
Firewall - VPN
NIDS
Only the message data is encrypted
22. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
Mantraps
PEAP-TLS
DMZ
Video surveillance
23. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Clean desk policy
Vulnerability scan
Principle of least privilege
Hierarchical list of critical systems
24. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Use SSH to connect to the Linux shell
Block port 23 on the network firewall.
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Virtual servers have the same information security requirements as physical servers.
25. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
Cognitive passwords
MS-CHAP
Gas
Forward to different RDP listening ports.
26. NIDS can also be used to help identify...
Fault tolerance
smurf attacks
Confidentiality - Availability
Rogue access point
27. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Run the image through SHA256. Answer: D
Botnet
Use SSH to connect to the Linux shell
Confidentiality
28. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Mantrap
Visibility - Accessibility - Neighborhood crime rate
Mandatory vacation
Protocol analyzer
29. Which of the following is true regarding the WTLS protocol?
Configure the IE popup blockers
It is used to provide data encryption for WAP connections.
Bluesnarfing
Least privilege
30. A company that purchases insurance to reduce risk is an example of which of the following?
escalation of privileges.
Firewall rulesflow of network traffic at the edge of the network
Risk transference
Vishing
31. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
Risk assessmentproduct Answer: D
signing of a user agreement.
DMZ
Risk transference
32. Which of the following is not an asymmetric system?
1433
DES
mitigation - acceptance - transference
Logic Bomb
33. Which of the following describes a passive attempt to identify weaknesses?
Vulnerability scanning
The development team is transferring data to test systems using SFTP and SCP.
SSL
Logic Bomb
34. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
Cross-site scripting
ACLs
NIDS
1433
35. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Baseline reporting
Disable unused services - Update HIPS signatures
SSL
Confidentiality - Availability
36. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Baseline reporting
Tailgating
The web site's private key.
NIDS
37. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
MAC address
Accountability
Smurf attack
Data Encryption Standard (DES)
38. Which of the following is the primary difference between a virus and a worm?
A worm is self-replicating
IPSec
Only the message data is encrypted
Firewall - VPN
39. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
1433
Multi-factor authentication.
A worm is self-replicating
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
40. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
Determine open ports
Evil twin
53
Data Encryption Standard (DES)
41. Which of the following BEST describes the proper method and reason to implement port security?
By masking the IP address of internal computers from the Internet
Mandatory vacations
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
To provide documentation as to who has handled the evidence
42. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Algorithm
Change Management System
The user's PC is missing the authentication agent.
Bluesnarfing
43. Which of the following security threats does shredding mitigate?
Dumpster diving
Block port 23 on the network firewall.
Use SSH to connect to the Linux shell
Vishing
44. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
Integrity
Determine the potential monetary costs related to a threat
DNS spoofing
AES and TKIP
45. The 802.11i standard specifies support for which encryption algorithms?
Diffie-Hellman
AES and TKIP
Rootkit
Shoulder surfing
46. Which of the following BEST describes an intrusion prevention system?
FTPS
Footprinting
A system that stops an attack in progress.
25
47. Which of the following is a best practice when securing a switch from physical access?
Judgment
Disable unused ports
Buffer overflow
DoS
48. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
Location that meets power and connectivity requirementsdatacenter
WPA2
Baseline reporting
Platform as a Service
49. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Algorithm
Trojans
Logic Bomb
Evil twin
50. Which of the following is a management control type?
Protocol analyzer
By masking the IP address of internal computers from the Internet
Account disablement
Vulnerability scanning