SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following BEST explains the security benefit of a standardized server image?
Mandated security configurations have been made to the operating system.
Symmetric
Risk assessmentproduct Answer: D
Polymorphic
2. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Vulnerability scanning
Dumpster diving - Shoulder surfing
White box
Vulnerability scan
3. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
TPM
Having the offsite location of tapes also be the hot siteservers
Hardware RAID 5 - Software RAID 1
Privacy policy
4. Upper management decides which risk to mitigate based on cost. This is an example of:
Protocol analyzer
Vulnerability scanner
quantitative risk assessment
Virtual servers have the same information security requirements as physical servers.
5. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
BIOS
NIPS is blocking activities from those specific websites.
Memory - network processes - and system processesserver. If the computer is powered off
IPSec
6. Which of the following is used for exchanging secret keys over an insecure public network?
Virtual servers have the same information security requirements as physical servers.
ACLs
Disable unused services - Update HIPS signatures
Diffie-Hellman
7. Which of the following is used when performing a qualitative risk analysis?
Mantrap
A worm is self-replicating
Judgment
Cross-site scripting
8. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Evil twin
Least privilege
White box
Risk assessmentproduct Answer: D
9. Which of the following can prevent an unauthorized employee from entering a data center?
Security guard - Proximity reader
SSH
User rights and permissions reviews
content inspection.
10. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
DNS spoofing
WPA2
Software as a Service
Network Access Control
11. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
To provide documentation as to who has handled the evidence
A worm is self-replicating
To minimize the organizational risk posed by users
Visibility - Accessibility - Neighborhood crime rate
12. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
ID badges
DMZ
Blind FTP
Black hat
13. Which of the following risks may result from improper use of social networking and P2P software?
Protocol analyzer
Check if relaying is denied for unauthorized domains
It is used to provide data encryption for WAP connections.
Information disclosure
14. Actively monitoring data streams in search of malicious code or behavior is an example of..
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
ID badges
content inspection.
Firewall - VPN
15. Which of the following is a security control that is lost when using cloud computing?
Physical control of the data
Pharming - Logic bomb
VLAN
Mandatory vacation
16. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
Mandatory vacation
DMZ
Content filtering
Initial vector
17. Which of the following describes when forensic hashing should occur on a drive?
Before and after the imaging process and then hash the forensic image
Vulnerability scan
Off-site backup
FTPS
18. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Diffie-Hellman
Buffer overflow
Add input validation to forms.
Power levels
19. In which of the following locations would a forensic analyst look to find a hooked process?
Spear phishing
BIOS
Shielding
Platform as a Service
20. Which of the following is another name for a malicious attacker?
Install a network-based IDS
Run the image through SHA256. Answer: D
Black hat
The development team is transferring data to test systems using SFTP and SCP.
21. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Implement a change management strategy
Rootkit
Cross-site scripting
Shoulder surfing
22. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
HSM
Segmentation of each wireless user from other wireless users
Principle of least privilege
Spam filters
23. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
DNS spoofing
Confidentiality - Availability
SSL
Hierarchical list of critical systems
24. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
TPM
Physical control of the data
Account disablement
Asset value
25. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
A worm is self-replicating
Vulnerability scanner
By masking the IP address of internal computers from the Internet
TPM
26. Which of the following should be enabled to ensure only certain wireless clients can access the network?
Mandatory vacation
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
MAC filtering
Multi-factor authentication.
27. On-going annual awareness security training should be coupled with:..
Provider cloud
WPA2-PSK
Smurf attack
signing of a user agreement.
28. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
War driving
Spear phishing
Black hat
content inspection.
29. Which of the following is true concerning email message encryption by using S/MIME?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
The server is missing the default gateway.
Clean desk policy
Only the message data is encrypted
30. Which of the following is a detective security control?
Change Management System
CCTV
Buffer overflow
quantitative risk assessment
31. Which of the following security threats does shredding mitigate?
Dumpster diving
Buffer overflow
content inspection.
Man-in-the-middle
32. Which of the following should NOT be used with username/password authentication?
IDS
Cognitive passwords
Use SSH to connect to the Linux shell
Visibility - Accessibility - Neighborhood crime rate
33. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Provider cloud
content inspection.
Buffer overflow
Detective
34. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
ID badges
Trojans
MAC
Evil twin
35. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
System A fails open. System B fails closed.
Spear phishing
Use SSH to connect to the Linux shell
Symmetric Key
36. Which of the following is a best practice when securing a switch from physical access?
Disable unused ports
Botnet
EMI shielding
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
37. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
S/MIME PGP
Decrease the power levels on the WAP
A system that stops an attack in progress.
Spear phishing
38. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
quantitative risk assessment
Run the image through SHA256. Answer: D
ARP poisoning
IPv6
39. Which of the following environmental variables reduces the potential for static discharges?
Humidity
Buffer overflow
Protocol analyzer
Physical control of the data
40. DRPs should contain which of the following?
Protocol analyzer
Integrity
Mandated security configurations have been made to the operating system.
Hierarchical list of critical systems
41. What types of encryption are used for adding a digital signature to a message?
Gas
Security guard - Proximity reader
Risk assessmentproduct Answer: D
Asymmetric and Hashing
42. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
Implement a change management strategy
TLS
ARP poisoning
Rogue access points
43. Which of the following is the MOST secure method of utilizing FTP?
FTPS
Segmentation of each wireless user from other wireless users
Determine the potential monetary costs related to a threat
80 - 443
44. Which of the following access control models allows classification and labeling of objects?
The web site's private key.
The user's PC is missing the authentication agent.
MAC
Social Engineering attack
45. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?
Platform as a Service
NIDS
MAC address
Fiber optic
46. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
VLAN
content inspection.
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Black hat
47. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Baseline reporting
War driving
The web site's private key.
Determine the potential monetary costs related to a threat
48. Webmail is classified under which of the following cloud-based technologies?
Software as a Service (SaaS)
Risk transference
Determine open ports
Black hat
49. Which environmental control is part of TEMPEST compliance?
Vulnerability scan
Clustering
DMZ
Shielding
50. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests