SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
Buffer overflow
Use SSH to connect to the Linux shell
SSL
War driving
2. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
MS-CHAP
Determine the potential monetary costs related to a threat
Power levels
Fault tolerance
3. What is the advantage of using application virtualization?
Implicit deny
Lets you minimize the attack surface relating to the application
se file servers attached to an NAS system.
Asset value
4. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
To provide documentation as to who has handled the evidence
DES
Platform as a Service
Proxies
5. Which of the following risks may result from improper use of social networking and P2P software?
Rogue access point
SSH
Information disclosure
Detective
6. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Privilege escalation
Multi-factor authentication.
Social Engineering attack
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
7. Which of the following logical controls does a flood guard protect against?
The server is missing the default gateway.
SYN attacks
NOOP instructions
quantitative risk assessment
8. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
Man-in-the-middle
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Virtual servers have the same information security requirements as physical servers.
Rogue access points
9. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?
Risk transference
PEAP-TLS
WPA2
Mantraps
10. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
Add input validation to forms.
53
Power levels
Steganography
11. Separating of duties is valuable in deterring?
Fraud
Deny all
Organize data based on severity and asset value.
Spear phishing
12. The 802.11i standard specifies support for which encryption algorithms?
CAC
Physical control of the data
User rights and permissions reviews
AES and TKIP
13. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?
Enact a policy banning users from bringing in personal music devices.
Vishing
Blind FTP
Integrity
14. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Command injection
ID badges
ICMP
Privacy policy
15. Which of the following is the BEST way to secure data for the purpose of retention?
se file servers attached to an NAS system.
Off-site backup
ACLs
NIDS
16. Isolation mode on an AP provides which of the following functionality types?
Network Access Control
Cross-site scripting
Detective
Segmentation of each wireless user from other wireless users
17. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
VLAN
Memory - network processes - and system processesserver. If the computer is powered off
Implement a change management strategy
ACLs
18. Which of the following is an unauthorized wireless router that allows access to a secure network?
NIDS
Rogue access point
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Black hat
19. Which of the following will provide the HIGHEST level of wireless network security?
Proxies
Mantraps
Buffer overflow
WPA2
20. Which of the following access control models allows classification and labeling of objects?
MAC
Dumpster diving
AES and TKIP
Baseline reporting
21. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Tailgating
25
The remote router has ICMP blocked.
Configure the IE popup blockers
22. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
Gas
A worm is self-replicating
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
AC filtering - Disabled SSID broadcast
23. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
The PC has become part of a botnet.
Buffer overflow
By masking the IP address of internal computers from the Internet
System A fails open. System B fails closed.
24. Which of the following is another name for a malicious attacker?
Birthday - Full name
Black hat
Physical control of the data
Cross-site scripting
25. Which of the following BEST explains the security benefit of a standardized server image?
Platform as a Service
Configure the IE popup blockers
EMI shielding
Mandated security configurations have been made to the operating system.
26. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Clean desk policy
Firewall - VPN
Use SSH to connect to the Linux shell
Availability
27. A company that purchases insurance to reduce risk is an example of which of the following?
EMI shielding
Risk transference
escalation of privileges.
Command injection
28. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
Virtual servers have the same information security requirements as physical servers.
To ensure that staff understands what data they are handling and processing
Use SSH to connect to the Linux shell
Disable unused ports
29. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Initial vector
Fraud
Man-in-the-middle
Having the offsite location of tapes also be the hot siteservers
30. Which of the following is MOST relevant to a buffer overflow attack?
Information disclosure
NOOP instructions
Humidity
Asymmetric and Hashing
31. Which of the following can prevent an unauthorized employee from entering a data center?
Mandated security configurations have been made to the operating system.
Security guard - Proximity reader
TCP SYN flood attack
To provide documentation as to who has handled the evidence
32. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
80 - 443
Change Management System
Configure the IE popup blockers
IKE
33. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
extremely slow and numerous antivirus alerts
The user's PC is missing the authentication agent.
Asymmetric and Hashing
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
34. Which of the following reduces the likelihood of a single point of failure when a server fails?
Clustering
Risk transference
Algorithm
Hot and cold aisles
35. A system administrator could have a user level account and an administrator account to prevent:...
22
Steganography
escalation of privileges.
Baseline reporting
36. Which of the following is a technique designed to obtain information from a specific person?
Spear phishing
NOOP instructions
CAC
Availability
37. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Use SSH to connect to the Linux shell
Change Management System
Software as a Service
22
38. Which environmental control is part of TEMPEST compliance?
Lets you minimize the attack surface relating to the application
Shielding
WPA Enterprise
Deny all
39. Which of the following devices is often used to cache and filter content?
Proxies
Algorithm
Provider cloud
Business impact analysis
40. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
ARP poisoning
Availability
Forward to different RDP listening ports.
WPA Enterprise
41. Which of the following facilitates computing for heavily utilized systems and networks?
Information disclosure
Clustering
Man-in-the-middle
Provider cloud
42. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Dumpster diving - Shoulder surfing
CCTV
Logic Bomb
Multi-factor authentication.
43. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
Hardware RAID 5 - Software RAID 1
Blind FTP
DNS spoofing
The server is missing the default gateway.
44. Which of the following is MOST likely to be the last rule contained on any firewall?
The remote router has ICMP blocked.
SSL
Implicit deny
Mandatory vacations
45. Which of the following are accomplished when a message is digitally signed?
Logic Bomb
Integrity and Authentication
Availability
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
46. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi
Principle of least privilege
Tailgating
Security guard - Proximity reader
SSH
47. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
Data Encryption Standard (DES)
Visibility - Accessibility - Neighborhood crime rate
Dumpster diving
Botnet
48. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Check if relaying is denied for unauthorized domains
Birthday - Full name
25
Footprinting
49. Performing routine security audits is a form of which of the following controls?
Mandatory vacation
Spear phishing
Detective
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
50. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
Spear phishing
Configure the IE popup blockers
Implicit deny
ARP poisoning