SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
War driving
Whaling
MAC
Steganography
2. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
Symmetric
The server is missing the default gateway.
The PC has become part of a botnet.
Availability
3. A system administrator could have a user level account and an administrator account to prevent:...
AC filtering - Disabled SSID broadcast
escalation of privileges.
Load balancer
Off-site backup
4. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. Which of the following reduces the likelihood of a single point of failure when a server fails?
The server is missing the default gateway.
quantitative risk assessment
DoS
Clustering
6. For which of the following is centralized key management most complicated?
Spear phishing
A system that stops an attack in progress.
Symmetric Key
Confidentiality - Availability
7. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
Privacy policy
Blind FTP
Baseline reporting
MAC
8. Which of the following protocols requires the use of a CA based authentication process?
PEAP-TLS
AC filtering - Disabled SSID broadcast
signing of a user agreement.
Logic Bomb
9. Which of the following is the MOST secure method of utilizing FTP?
FTPS
Accountability
IPSec
By masking the IP address of internal computers from the Internet
10. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
Baseline reporting
Data Encryption Standard (DES)
MAC address
EMI shielding
11. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Load balancer
se file servers attached to an NAS system.
Virtual servers have the same information security requirements as physical servers.
Command injection
12. Which of the following is MOST likely to be the last rule contained on any firewall?
SSL
NOOP instructions
A system that stops an attack in progress.
Implicit deny
13. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
CAC
Evil twin
SNMP (also use to monitor the parameters of network devices)
To minimize the organizational risk posed by users
14. Which of the following is a management control type?
Lets you minimize the attack surface relating to the application
Vulnerability scanning
Accountability
Only the message data is encrypted
15. Which of the following is MOST commonly a part of routine system audits?
Least privilege
smurf attacks
Protocol analyzer
User rights and permissions reviews
16. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Cross-site scripting
Phishing techniques
Provider cloud
Segmentation of each wireless user from other wireless users
17. Which of the following is a best practice when securing a switch from physical access?
Disable unused ports
Fault tolerance
Integrity and Authentication
A system that stops an attack in progress.
18. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
By masking the IP address of internal computers from the Internet
DMZ
Steganography
HSM
19. Which of the following BEST describes an intrusion prevention system?
Privilege escalation
A system that stops an attack in progress.
Block port 23 on the network firewall.
SSH
20. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
Cross-site scripting
AC filtering - Disabled SSID broadcast
Memory - network processes - and system processesserver. If the computer is powered off
Visibility - Accessibility - Neighborhood crime rate
21. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Vulnerability scan
Mantraps
Protocol analyzer
Run the image through SHA256. Answer: D
22. Which of the following are the default ports for HTTP and HTTPS protocols?
DAC
80 - 443
War driving
Load balancer
23. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.
The web site's private key.
SYN attacks
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
24. Which of the following BEST describes the proper method and reason to implement port security?
PEAP-TLS
Deny all
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Logic Bomb
25. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
Spear phishing
ID badges
Shoulder surfing
TCP SYN flood attack
26. What types of encryption are used for adding a digital signature to a message?
MD5
System A fails open. System B fails closed.
Asymmetric and Hashing
Hot and cold aisles
27. Performing routine security audits is a form of which of the following controls?
MS-CHAP
Software as a Service (SaaS)
Business impact analysis
Detective
28. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
MS-CHAP
Privacy policy
The development team is transferring data to test systems using SFTP and SCP.
EMI shielding
29. Which of the following can prevent an unauthorized employee from entering a data center?
Clustering
Security guard - Proximity reader
Install a network-based IDS
Mantraps
30. Which of the following attacks would password masking help mitigate?
Firewall rulesflow of network traffic at the edge of the network
Shoulder surfing
Birthday - Full name
Multi-factor authentication.
31. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
Run the image through SHA256. Answer: D
MAC
Deny all
By masking the IP address of internal computers from the Internet
32. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
Add input validation to forms.
Load balancer
Rootkit
content inspection.
33. Which of the following is true regarding the WTLS protocol?
Organize data based on severity and asset value.
DAC
content inspection.
It is used to provide data encryption for WAP connections.
34. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
S/MIME PGP
Firewall - VPN
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
A system that stops an attack in progress.
35. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
MAC
User rights
Accountability
Chain of custody
36. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
Visibility - Accessibility - Neighborhood crime rate
The new access point was mis-configured and is interfering with another nearby access point.
Software as a Service
Block port 23 on the network firewall.
37. The 802.11i standard specifies support for which encryption algorithms?
Symmetric
Proxies
SYN attacks
AES and TKIP
38. Upper management decides which risk to mitigate based on cost. This is an example of:
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Video surveillance
FTPS
quantitative risk assessment
39. What key is used to encrypt an HTTPS session?
Rootkit
Symmetric
The web site's private key.
SYN attacks
40. Which of the following describes when forensic hashing should occur on a drive?
Before and after the imaging process and then hash the forensic image
Physical control of the data
NOOP instructions
Birthday - Full name
41. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
IPSec
IPSec
22
Check if relaying is denied for unauthorized domains
42. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
War driving
Clean desk policy
NIDS
The PC has become part of a botnet.
43. Which of the following is specific to a buffer overflow attack?
Provider cloud
Initial vector
Disable unused services - Update HIPS signatures
The web site's private key.
44. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Firewall - VPN
Cross-site scripting
DMZ
Integrity and Authentication
45. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
Determine open ports
NIDS
MS-CHAP
IPv6
46. The detection of a NOOP sled is an indication of which of the following attacks?
Buffer overflow
Implement a change management strategy
Botnet
WPA2-PSK
47. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Having the offsite location of tapes also be the hot siteservers
CCTV
The user's PC is missing the authentication agent.
IDEA and TripleDes
48. Which of the following is not an asymmetric system?
DES
IDS
22
AC filtering - Disabled SSID broadcast
49. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Check if relaying is denied for unauthorized domains
Hardware RAID 5 - Software RAID 1
Baseline reporting
DMZ
50. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Clean desk policy
Footprinting
Forward to different RDP listening ports.
The user's PC is missing the authentication agent.
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests