SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following should be installed to prevent employees from receiving unsolicited emails?
Spam filters
Change Management System
IDS
Risk transference
2. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces
Install a network-based IDS
SSH
To provide documentation as to who has handled the evidence
Enact a policy banning users from bringing in personal music devices.
3. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
DAC
Dumpster diving - Shoulder surfing
TLS
Fault tolerance
4. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
EMI shielding
WPA2-PSK
Baseline reporting
Evil twin
5. The detection of a NOOP sled is an indication of which of the following attacks?
SNMP (also use to monitor the parameters of network devices)
Buffer overflow
By masking the IP address of internal computers from the Internet
Confidentiality
6. Which of the following reduces the likelihood of a single point of failure when a server fails?
Cognitive passwords
Clustering
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Platform as a Service
7. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
By masking the IP address of internal computers from the Internet
Determine open ports
The remote router has ICMP blocked.
It is used to provide data encryption for WAP connections.
8. Which of the following logical controls does a flood guard protect against?
Footprinting
WPA Enterprise
Least privilege
SYN attacks
9. Which of the following manages peer authentication and key exchange for an IPSec connection?
IKE
Segmentation of each wireless user from other wireless users
PEAP-TLS
To minimize the organizational risk posed by users
10. Which of the following should be enabled to ensure only certain wireless clients can access the network?
The user's PC is missing the authentication agent.
Lets you minimize the attack surface relating to the application
Power levels
MAC filtering
11. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Use SSH to connect to the Linux shell
S/MIME PGP
Implicit deny
Command injection
12. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
IDEA and TripleDes
WPA2
Location that meets power and connectivity requirementsdatacenter
The PC has become part of a botnet.
13. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
DAC
SSL
Footprinting
DoS
14. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Availability
Physical control of the data
25
Humidity
15. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Network Access Control
DAC
Firewall rulesflow of network traffic at the edge of the network
SYN attacks
16. Which of the following should be performed on a computer to protect the operating system from malicious software?
MAC filtering
Decrease the power levels on the WAP
Detective
Disable unused services - Update HIPS signatures
17. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
IPSec
IPv6
Birthday - Full name
18. What are typical elements of authentication as part of physical access controls?
Buffer overflow
Location that meets power and connectivity requirementsdatacenter
se file servers attached to an NAS system.
ID badges
19. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Evil twin
AES and TKIP
Mandatory vacation
Data Encryption Standard (DES)
20. Which of the following protocols requires the use of a CA based authentication process?
Risk transference
Buffer overflow
Initial vector
PEAP-TLS
21. Which of the following is another name for a malicious attacker?
ACLs
Black hat
SSH
MAC filtering
22. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
SNMP (also use to monitor the parameters of network devices)
Shoulder surfing
Rogue access points
Blind FTP
23. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
NIPS is blocking activities from those specific websites.
Account disablement
Information disclosure
The server is missing the default gateway.
24. DRPs should contain which of the following?
Hierarchical list of critical systems
DNS spoofing
Algorithm
Buffer overflow
25. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Rootkit
Validate input to remove hypertext
Run the image through SHA256. Answer: D
Security guard - Proximity reader
26. A system administrator could have a user level account and an administrator account to prevent:...
The web site's private key.
Birthday - Full name
Load balancer
escalation of privileges.
27. Which of the following port numbers is used for SCP by default?
22
Business impact analysis
Fiber optic
WPA2-PSK
28. Which of the following is MOST relevant to a buffer overflow attack?
Dumpster diving - Shoulder surfing
NOOP instructions
Asset value
Software as a Service
29. Which of the following includes a photo and can be used for identification?
Mandated security configurations have been made to the operating system.
CAC
Pharming - Logic bomb
Gas
30. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
SNMP (also use to monitor the parameters of network devices)
Hot and cold aisles
Validate input to remove hypertext
Principle of least privilege
31. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
The server is missing the default gateway.
Protocol analyzer
Privacy policy
Business impact analysis
32. Which of the following are accomplished when a message is digitally signed?
Integrity and Authentication
Integrity
MS-CHAP
1433
33. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Humidity
Buffer overflow
Firewall - VPN
25
34. Which of the following is NOT an application layer security protocol?
Validate input to remove hypertext
Vulnerability scanning
Business impact analysis
IPSec
35. Which of the following is a management control type?
Multi-factor authentication.
DMZ
Rootkit
Vulnerability scanning
36. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
DMZ
Buffer overflow
Load balancer
Vulnerability scanning
37. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Information disclosure
DMZ
Botnet
Footprinting
38. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
WPA Enterprise
MAC address
Video surveillance
Power levels
39. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Enact a policy banning users from bringing in personal music devices.
Baseline reporting
Cognitive passwords
Command injection
40. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
IPv6
WPA2
Shoulder surfing
AC filtering - Disabled SSID broadcast
41. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
Bluesnarfing
Botnet
Confidentiality - Availability
IDS
42. Which of the following can prevent an unauthorized employee from entering a data center?
Load balancer
NIDS
Security guard - Proximity reader
Evil twin
43. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
1433
Network Access Control
Deny all
Fiber optic
44. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
se file servers attached to an NAS system.
Disable unused ports
DAC
Loop protection
45. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
Video surveillance
To provide documentation as to who has handled the evidence
extremely slow and numerous antivirus alerts
Diffie-Hellman
46. Which of the following devices would allow a technician to view IP headers on a data packet?
MS-CHAP
FTPS
Protocol analyzer
Mantrap
47. How does a NAT server help protect your network?
By masking the IP address of internal computers from the Internet
Forward to different RDP listening ports.
Network Access Control
The web site's private key.
48. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?
DNS spoofing
Dumpster diving
Platform as a Service
Evil twin
49. What port does the Domain Name Service (DNS) use by default?
53
Accountability
Loop protection
MAC
50. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
Data Encryption Standard (DES)
Segmentation of each wireless user from other wireless users
Baseline reporting
Botnet