SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
NIPS is blocking activities from those specific websites.
Buffer overflow
TPM
2. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?
Buffer overflow
Symmetric
Separation of duties
Dumpster diving - Shoulder surfing
3. Which of the following is the BEST way to secure data for the purpose of retention?
Vulnerability scan
Off-site backup
Integrity
IKE
4. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
Asset value
The development team is transferring data to test systems using SFTP and SCP.
Organize data based on severity and asset value.
VPN concentrator
5. Which of the following would need to be configured correctly to allow remote access to the network?
ACLs
Install a network-based IDS
80 - 443
CAC
6. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Content filtering
Logic Bomb
Smurf attack
Implicit deny
7. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
System A fails open. System B fails closed.
The development team is transferring data to test systems using SFTP and SCP.
Location that meets power and connectivity requirementsdatacenter
NOOP instructions
8. You are performing risk assessment for an organization. What should you do during impact assessment?
Determine the potential monetary costs related to a threat
Initial vector
DES
escalation of privileges.
9. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
Rogue access points
1433
The remote router has ICMP blocked.
Off-site backup
10. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
Organize data based on severity and asset value.
Least privilege
Mandatory vacations
Mantrap
11. With which of the following is RAID MOST concerned?
Availability
Determine the potential monetary costs related to a threat
Software as a Service (SaaS)
NOOP instructions
12. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
Proxies
Network Access Control
War driving
HSM
13. Which of the following logical controls does a flood guard protect against?
MAC filtering
ICMP
SYN attacks
Multi-factor authentication.
14. The 802.11i standard specifies support for which encryption algorithms?
White box
AES and TKIP
Birthday - Full name
Blind FTP
15. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
ID badges
ACLs
Tailgating
IPSec
16. Which of the following is true regarding the WTLS protocol?
WPA2-PSK
Principle of least privilege
Risk assessmentproduct Answer: D
It is used to provide data encryption for WAP connections.
17. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
Visibility - Accessibility - Neighborhood crime rate
mitigation - acceptance - transference
Shielding
AC filtering - Disabled SSID broadcast
18. Which of the following is NOT an application layer security protocol?
MAC address
SSL
IPSec
Man-in-the-middle
19. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
TLS
Content filtering
IDEA and TripleDes
Rogue access point
20. Which of the following devices would allow a technician to view IP headers on a data packet?
Confidentiality - Availability
Implicit deny
Protocol analyzer
ID badges
21. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
quantitative risk assessment
Footprinting
MAC
WPA Enterprise
22. Which of the following is a technique designed to obtain information from a specific person?
Spear phishing
Protocol analyzer
Video surveillance
MAC
23. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
MAC
Physical control of the data
War driving
User rights and permissions reviews
24. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
Clean desk policy
AES and TKIP
MAC address
PEAP-TLS
25. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
HSM
Cross-site scripting
Organize data based on severity and asset value.
TCP SYN flood attack
26. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
Hierarchical list of critical systems
Content filtering
Cognitive passwords
Baseline reporting
27. Which of the following BEST explains the security benefit of a standardized server image?
Asset value
Mandated security configurations have been made to the operating system.
VLAN segregation
80 - 443
28. What port does the Domain Name Service (DNS) use by default?
53
Buffer overflow
Lets you minimize the attack surface relating to the application
Risk assessmentproduct Answer: D
29. What is the advantage of using application virtualization?
Lets you minimize the attack surface relating to the application
extremely slow and numerous antivirus alerts
Deny all
Fiber optic
30. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
SSL
IDS
Hardware RAID 5 - Software RAID 1
User rights and permissions reviews
31. Which of the following security threats does shredding mitigate?
SSH
Dumpster diving
HSM
MS-CHAP
32. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi
Polymorphic
Baseline reporting
Disable unused services - Update HIPS signatures
Principle of least privilege
33. Which of the following port numbers is used for SCP by default?
Cross-site scripting
Trojans
User rights and permissions reviews
22
34. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Mandatory vacation
SNMP (also use to monitor the parameters of network devices)
quantitative risk assessment
Protocol analyzer
35. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
White box
Implicit deny
Memory - network processes - and system processesserver. If the computer is powered off
Load balancer
36. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Cross-site scripting
Tailgating
A worm is self-replicating
CCTV
37. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
Only the message data is encrypted
Footprinting
ACLs
Gas
38. Which of the following is a best practice when securing a switch from physical access?
quantitative risk assessment
Disable unused ports
Data Encryption Standard (DES)
Provider cloud
39. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Power levels
Having the offsite location of tapes also be the hot siteservers
Implement a change management strategy
Buffer overflow
40. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Phishing techniques
Vulnerability scan
Dumpster diving - Shoulder surfing
Deny all
41. Which of the following concepts ensures that the data is only viewable to authorized users?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
The new access point was mis-configured and is interfering with another nearby access point.
Social Engineering attack
Confidentiality
42. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
smurf attacks
Diffie-Hellman
MAC filtering
extremely slow and numerous antivirus alerts
43. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
Rogue access points
Account disablement
Steganography
Organize data based on severity and asset value.
44. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Decrease the power levels on the WAP
escalation of privileges.
IPSec
Load balancer
45. Which of the following are the default ports for HTTP and HTTPS protocols?
Spear phishing
Accountability
80 - 443
HSM
46. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
Cross-site scripting
22
NIPS is blocking activities from those specific websites.
Evil twin
47. Which of the following allows a security administrator to set device traps?
Integrity
ARP poisoning
SSH
SNMP (also use to monitor the parameters of network devices)
48. Which of the following is the BEST choice for encryption on a wireless network?
Video surveillance
Location that meets power and connectivity requirementsdatacenter
EMI shielding
WPA2-PSK
49. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
To provide documentation as to who has handled the evidence
Confidentiality
Configure the IE popup blockers
Birthday - Full name
50. On-going annual awareness security training should be coupled with:..
signing of a user agreement.
Validate input to remove hypertext
Provider cloud
smurf attacks