SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which solution should you use?
extremely slow and numerous antivirus alerts
ACLs
se file servers attached to an NAS system.
Validate input to remove hypertext
2. Which of the following would need to be configured correctly to allow remote access to the network?
Smurf attack
1433
ACLs
HSM
3. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
DMZ
Confidentiality
FTPS
ACLs
4. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Privilege escalation
Organize data based on severity and asset value.
Implicit deny
White box
5. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
Multi-factor authentication.
VLAN
NIDS
53
6. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
The development team is transferring data to test systems using SFTP and SCP.
Multi-factor authentication.
TPM
Integrity
7. Which of the following is NOT an application layer security protocol?
Phishing techniques
IPSec
Man-in-the-middle
Only the message data is encrypted
8. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
SNMP (also use to monitor the parameters of network devices)
Change Management System
Implement a change management strategy
DES
9. Which of the following is the BEST choice for encryption on a wireless network?
Business impact analysis
Vishing
WPA2-PSK
Clean desk policy
10. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Pharming - Logic bomb
Rootkit
80 - 443
NIPS is blocking activities from those specific websites.
11. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Virtual servers have the same information security requirements as physical servers.
The remote router has ICMP blocked.
IDEA and TripleDes
Power levels
12. Which of the following uses TCP port 22 by default?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Diffie-Hellman
Mantraps
Baseline reporting
13. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
MAC
Check if relaying is denied for unauthorized domains
Steganography
IPSec
14. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?
Before and after the imaging process and then hash the forensic image
Loop protection
MAC
A worm is self-replicating
15. What types of encryption are used for adding a digital signature to a message?
WPA Enterprise
Asymmetric and Hashing
Steganography
MAC address
16. Which of the following is a detective security control?
CCTV
Having the offsite location of tapes also be the hot siteservers
Rootkit
Principle of least privilege
17. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
Implement a change management strategy
The development team is transferring data to test systems using SFTP and SCP.
ID badges
Lets you minimize the attack surface relating to the application
18. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
Firewall rulesflow of network traffic at the edge of the network
Protocol analyzer
Mandated security configurations have been made to the operating system.
DNS spoofing
19. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?
Diffie-Hellman
Provider cloud
The new access point was mis-configured and is interfering with another nearby access point.
Platform as a Service
20. Which of the following are the default ports for HTTP and HTTPS protocols?
Privilege escalation
The PC has become part of a botnet.
80 - 443
content inspection.
21. For which of the following is centralized key management most complicated?
Symmetric Key
Determine the potential monetary costs related to a threat
Buffer overflow
Decrease the power levels on the WAP
22. Separating of duties is valuable in deterring?
AES and TKIP
Off-site backup
Cognitive passwords
Fraud
23. Which of the following concepts ensures that the data is only viewable to authorized users?
Confidentiality
signing of a user agreement.
DMZ
Social Engineering attack
24. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
Segmentation of each wireless user from other wireless users
A worm is self-replicating
Accountability
Software as a Service
25. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Separation of duties
Accountability
Load balancer
Symmetric
26. Which of the following identifies some of the running services on a system?
A system that stops an attack in progress.
Determine open ports
Mantraps
Rootkit
27. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
Check if relaying is denied for unauthorized domains
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Hardware RAID 5 - Software RAID 1
Ensure a proper chain of custody
28. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Visibility - Accessibility - Neighborhood crime rate
Rogue access points
Physical control of the data
Mantrap
29. What allows for all activities on a network or system to be traced to the user who performed them?
Accountability
Segmentation of each wireless user from other wireless users
TPM
content inspection.
30. Which of the following is the MAIN reason to require data labeling?
Segmentation of each wireless user from other wireless users
Rootkit
To provide documentation as to who has handled the evidence
To ensure that staff understands what data they are handling and processing
31. Which of the following can prevent an unauthorized employee from entering a data center?
Security guard - Proximity reader
Initial vector
Location that meets power and connectivity requirementsdatacenter
Asymmetric and Hashing
32. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
Mantrap
AES and TKIP
Visibility - Accessibility - Neighborhood crime rate
Algorithm
33. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
Mandatory vacations
Decrease the power levels on the WAP
The PC has become part of a botnet.
Load balancer
34. Which of the following environmental variables reduces the potential for static discharges?
Humidity
Vulnerability scanning
Mantrap
80 - 443
35. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
Birthday - Full name
DAC
TCP SYN flood attack
Lets you minimize the attack surface relating to the application
36. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Shielding
Cognitive passwords
Dumpster diving - Shoulder surfing
Information disclosure
37. Which of the following is the MOST secure method of utilizing FTP?
FTPS
MAC address
Forward to different RDP listening ports.
AC filtering - Disabled SSID broadcast
38. Which of the following risks may result from improper use of social networking and P2P software?
signing of a user agreement.
Determine the potential monetary costs related to a threat
Information disclosure
Blind FTP
39. Which of the following allows a security administrator to set device traps?
Privacy policy
SNMP (also use to monitor the parameters of network devices)
ARP poisoning
Whaling
40. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
Tailgating
DAC
Configure the IE popup blockers
Information disclosure
41. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
Baseline reporting
Shielding
Dumpster diving
System A fails open. System B fails closed.
42. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
EMI shielding
Phishing techniques
DoS
IPSec
43. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
53
Steganography
Run the image through SHA256. Answer: D
VLAN
44. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
FTPS
Baseline reporting
Content filtering
Decrease the power levels on the WAP
45. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Disable unused services - Update HIPS signatures
ACLs
Logic Bomb
Install a network-based IDS
46. Which of the following should be installed to prevent employees from receiving unsolicited emails?
Spam filters
Hierarchical list of critical systems
Command injection
Baseline reporting
47. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
Bluesnarfing
Baseline reporting
NOOP instructions
Video surveillance
48. Webmail is classified under which of the following cloud-based technologies?
WPA Enterprise
MAC address
Risk transference
Software as a Service (SaaS)
49. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Lets you minimize the attack surface relating to the application
Vulnerability scan
Shoulder surfing
Hot and cold aisles
50. Which of the following attacks would password masking help mitigate?
Shoulder surfing
System A fails open. System B fails closed.
ACLs
Memory - network processes - and system processesserver. If the computer is powered off