SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
Risk transference
22
Video surveillance
Mandatory vacation
2. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
Validate input to remove hypertext
Separation of duties
Proxies
CCTV
3. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
1433
Initial vector
WPA2
User rights
4. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
IPSec
Run the image through SHA256. Answer: D
signing of a user agreement.
WPA2-PSK
5. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
Having the offsite location of tapes also be the hot siteservers
Software as a Service
IPSec
Physical control of the data
6. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Bluesnarfing
22
Video surveillance
Power levels
7. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Proxies
Data Encryption Standard (DES)
Having the offsite location of tapes also be the hot siteservers
Load balancer
8. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
VPN concentrator
DNS spoofing
Tailgating
Botnet
9. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
Vulnerability scan
Shoulder surfing
SSH
DAC
10. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
Confidentiality - Availability
se file servers attached to an NAS system.
Only the message data is encrypted
Symmetric
11. Which of the following is the primary difference between a virus and a worm?
Power levels
Hot and cold aisles
Phishing techniques
A worm is self-replicating
12. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Vulnerability scan
Privilege escalation
Least privilege
Smurf attack
13. Which of the following should be enabled to ensure only certain wireless clients can access the network?
Hardware RAID 5 - Software RAID 1
Forward to different RDP listening ports.
NOOP instructions
MAC filtering
14. Which of the following access control models allows classification and labeling of objects?
Confidentiality - Availability
MAC
Hardware RAID 5 - Software RAID 1
Asymmetric and Hashing
15. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
NIDS
Platform as a Service
Vulnerability scanning
DAC
16. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Baseline reporting
Power levels
escalation of privileges.
Buffer overflow
17. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
Buffer overflow
Mandatory vacation
AC filtering - Disabled SSID broadcast
SSL
18. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Mandatory vacation
Software as a Service
Least privilege
Off-site backup
19. Which of the following security threats does shredding mitigate?
Confidentiality - Availability
Dumpster diving
Birthday - Full name
AC filtering - Disabled SSID broadcast
20. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Mantrap
The web site's public key.
Vulnerability scan
Risk transference
21. Which environmental control is part of TEMPEST compliance?
System A fails open. System B fails closed.
IPv6
Mandatory vacations
Shielding
22. Which of the following is a reason to perform user awareness and training?
To minimize the organizational risk posed by users
Baseline reporting
The user's PC is missing the authentication agent.
IPSec
23. Which of the following includes a photo and can be used for identification?
CAC
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Spam filters
The web site's public key.
24. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
Evil twin
Man-in-the-middle
Buffer overflow
Trojans
25. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
SNMP (also use to monitor the parameters of network devices)
Bluesnarfing
MAC
S/MIME PGP
26. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
WPA2
ACLs
Smurf attack
AES and TKIP
27. Which of the following will provide the HIGHEST level of wireless network security?
CCTV
Proxies
WPA2
Logic Bomb
28. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
Evil twin
Tailgating
Principle of least privilege
Ensure a proper chain of custody
29. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
MAC address
22
Gas
Symmetric Key
30. What types of encryption are used for adding a digital signature to a message?
Asymmetric and Hashing
Cognitive passwords
Cross-site scripting
SSH
31. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Pharming - Logic bomb
FTPS
The web site's public key.
quantitative risk assessment
32. Used in conjunction which of the following are PII?
80 - 443
Birthday - Full name
Protocol analyzer
The PC has become part of a botnet.
33. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
Algorithm
Separation of duties
Risk assessmentproduct Answer: D
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
34. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
Location that meets power and connectivity requirementsdatacenter
SSH
Command injection
Vulnerability scan
35. Isolation mode on an AP provides which of the following functionality types?
Humidity
Segmentation of each wireless user from other wireless users
Spear phishing
FTPS
36. Which of the following is a technique designed to obtain information from a specific person?
25
Fiber optic
Spear phishing
Change Management System
37. Risk can be managed in the following ways...
HSM
Account disablement
mitigation - acceptance - transference
Availability
38. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
Vishing
Mantrap
Ensure a proper chain of custody
Segmentation of each wireless user from other wireless users
39. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
NOOP instructions
EMI shielding
Tailgating
Baseline reporting
40. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
To ensure that staff understands what data they are handling and processing
escalation of privileges.
AC filtering - Disabled SSID broadcast
Firewall - VPN
41. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
User rights
Mandatory vacations
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
42. With which of the following is RAID MOST concerned?
Forward to different RDP listening ports.
Availability
IKE
Load balancer
43. Which of the following can prevent an unauthorized employee from entering a data center?
Hardware RAID 5 - Software RAID 1
Security guard - Proximity reader
War driving
TCP SYN flood attack
44. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
MAC address
Firewall rulesflow of network traffic at the edge of the network
content inspection.
SNMP (also use to monitor the parameters of network devices)
45. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
Video surveillance
Baseline reporting
Phishing techniques
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
46. Upper management decides which risk to mitigate based on cost. This is an example of:
Vulnerability scanner
Check if relaying is denied for unauthorized domains
Spear phishing
quantitative risk assessment
47. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
Logic Bomb
Change Management System
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Blind FTP
48. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
Configure the IE popup blockers
A system that stops an attack in progress.
The remote router has ICMP blocked.
Mandatory vacation
49. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
CAC
1433
Phishing techniques
Software as a Service
50. Which of the following BEST explains the security benefit of a standardized server image?
Confidentiality
Mandated security configurations have been made to the operating system.
Principle of least privilege
Whaling