Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
|
SUBJECTS
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 30 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Phishing techniques
Install a network-based IDS
Clustering
Cross-site scripting
2. Isolation mode on an AP provides which of the following functionality types?
SSL
ID badges
53
Segmentation of each wireless user from other wireless users
3. Which of the following concepts ensures that the data is only viewable to authorized users?
Baseline reporting
Tailgating
Confidentiality
Shielding
4. Which of the following is used when performing a quantitative risk analysis?
Asset value
Rootkit
Symmetric Key
Blind FTP
5. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
Cross-site scripting
Separation of duties
AC filtering - Disabled SSID broadcast
DMZ
6. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
Protocol analyzer
Spear phishing
To provide documentation as to who has handled the evidence
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
7. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Privilege escalation
User rights
By masking the IP address of internal computers from the Internet
53
8. Which of the following should be enabled to ensure only certain wireless clients can access the network?
MAC filtering
1433
Asset value
Blind FTP
9. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
Vishing
ICMP
MAC filtering
Whaling
10. Which of the following port numbers is used for SCP by default?
Power levels
signing of a user agreement.
PEAP-TLS
22
11. Which of the following should be performed on a computer to protect the operating system from malicious software?
FTPS
Fiber optic
Disable unused services - Update HIPS signatures
quantitative risk assessment
12. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Virtual servers have the same information security requirements as physical servers.
Firewall rulesflow of network traffic at the edge of the network
The development team is transferring data to test systems using SFTP and SCP.
White box
13. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
signing of a user agreement.
Block port 23 on the network firewall.
Content filtering
ID badges
14. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
Judgment
Symmetric Key
Power levels
Mantraps
15. On-going annual awareness security training should be coupled with:..
IPSec
Botnet
signing of a user agreement.
WPA2-PSK
16. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Organize data based on severity and asset value.
Use SSH to connect to the Linux shell
It is used to provide data encryption for WAP connections.
Mandated security configurations have been made to the operating system.
17. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Command injection
Add input validation to forms.
The web site's public key.
The remote router has ICMP blocked.
18. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Power levels
Information disclosure
Rogue access point
Rootkit
19. Which of the following is the MOST secure method of utilizing FTP?
FTPS
MAC
Block port 23 on the network firewall.
Run the image through SHA256. Answer: D
20. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
Dumpster diving
Command injection
extremely slow and numerous antivirus alerts
Cross-site scripting
21. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Add input validation to forms.
ICMP
AC filtering - Disabled SSID broadcast
Mandatory vacations
22. Which of the following uses TCP port 22 by default?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
TPM
Software as a Service
By masking the IP address of internal computers from the Internet
23. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
SSL
S/MIME PGP
AC filtering - Disabled SSID broadcast
Footprinting
24. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
Deny all
IPSec
IPv6
Accountability
25. Which of the following functions is MOST likely performed by a web security gateway?
Spam filters
Mandated security configurations have been made to the operating system.
Content filtering
NIDS
26. With which of the following is RAID MOST concerned?
A worm is self-replicating
Availability
Configure the IE popup blockers
Vulnerability scanning
27. Which of the following is a security control that is lost when using cloud computing?
quantitative risk assessment
Physical control of the data
Fraud
ACLs
28. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
Spam filters
Clustering
SSH
ACLs
29. Which of the following should be installed to prevent employees from receiving unsolicited emails?
Clustering
Lets you minimize the attack surface relating to the application
IPv6
Spam filters
30. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
Man-in-the-middle
The user's PC is missing the authentication agent.
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Buffer overflow
31. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?
Change Management System
Whaling
Principle of least privilege
Polymorphic
32. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
MAC address
Gas
Pharming - Logic bomb
Proxies
33. Which of the following security threats does shredding mitigate?
Evil twin
A system that stops an attack in progress.
Dumpster diving
mitigation - acceptance - transference
34. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
Fraud
Virtual servers have the same information security requirements as physical servers.
MAC
Implicit deny
35. What are typical elements of authentication as part of physical access controls?
Forward to different RDP listening ports.
ID badges
DMZ
Implement a change management strategy
36. Which of the following is MOST relevant to a buffer overflow attack?
WPA Enterprise
NOOP instructions
DMZ
FTPS
37. Which of the following is the MAIN reason to require data labeling?
Buffer overflow
Lets you minimize the attack surface relating to the application
AC filtering - Disabled SSID broadcast
To ensure that staff understands what data they are handling and processing
38. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m
The new access point was mis-configured and is interfering with another nearby access point.
User rights
DES
To provide documentation as to who has handled the evidence
39. Which of the following is true regarding the WTLS protocol?
Rootkit
Loop protection
It is used to provide data encryption for WAP connections.
CAC
40. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
Buffer overflow
Hierarchical list of critical systems
Blind FTP
MAC
41. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Virtual servers have the same information security requirements as physical servers.
Footprinting
53
Forward to different RDP listening ports.
42. Which of the following is MOST likely to be the last rule contained on any firewall?
Implicit deny
Judgment
EMI shielding
Location that meets power and connectivity requirementsdatacenter
43. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Rogue access points
Polymorphic
Chain of custody
Implicit deny
44. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Enact a policy banning users from bringing in personal music devices.
Virtual servers have the same information security requirements as physical servers.
80 - 443
Confidentiality - Availability
45. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Steganography
Asset value
MS-CHAP
Shielding
46. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
DMZ
Block port 23 on the network firewall.
content inspection.
Segmentation of each wireless user from other wireless users
47. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Loop protection
25
Disable unused services - Update HIPS signatures
Buffer overflow
48. Which of the following is not an asymmetric system?
Software as a Service
TPM
DES
Before and after the imaging process and then hash the forensic image
49. Which of the following allows a security administrator to set device traps?
Implicit deny
Power levels
SNMP (also use to monitor the parameters of network devices)
Polymorphic
50. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Firewall - VPN
S/MIME PGP
NIDS
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.