SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
Detective
IPSec
MAC
Mandated security configurations have been made to the operating system.
2. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
Humidity
SNMP (also use to monitor the parameters of network devices)
VLAN segregation
Trojans
3. Which of the following is an unauthorized wireless router that allows access to a secure network?
Rogue access point
DAC
Privacy policy
NIPS is blocking activities from those specific websites.
4. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
WPA2-PSK
Deny all
Spear phishing
Multi-factor authentication.
5. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.
The web site's public key.
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
The new access point was mis-configured and is interfering with another nearby access point.
IPSec
6. Which of the following is used when performing a qualitative risk analysis?
Segmentation of each wireless user from other wireless users
Enact a policy banning users from bringing in personal music devices.
MS-CHAP
Judgment
7. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Least privilege
VLAN segregation
Rogue access point
8. Which of the following risks may result from improper use of social networking and P2P software?
Off-site backup
Platform as a Service
80 - 443
Information disclosure
9. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Rootkit
Whaling
Baseline reporting
Load balancer
10. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
To provide documentation as to who has handled the evidence
Organize data based on severity and asset value.
The PC has become part of a botnet.
IPSec
11. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. Which of the following is a security control that is lost when using cloud computing?
Location that meets power and connectivity requirementsdatacenter
Physical control of the data
Vulnerability scanner
MS-CHAP
13. Which solution should you use?
The PC has become part of a botnet.
se file servers attached to an NAS system.
It is used to provide data encryption for WAP connections.
extremely slow and numerous antivirus alerts
14. Which of the following authentication protocols utilizes the MD4 hashing algorithm?
MAC filtering
Clean desk policy
Baseline reporting
MS-CHAP
15. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
Man-in-the-middle
The server is missing the default gateway.
extremely slow and numerous antivirus alerts
The development team is transferring data to test systems using SFTP and SCP.
16. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Algorithm
Account disablement
Vulnerability scanning
Organize data based on severity and asset value.
17. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
Spear phishing
Determine open ports
MD5
Location that meets power and connectivity requirementsdatacenter
18. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
DAC
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Account disablement
Load balancer
19. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Vulnerability scan
Implicit deny
Algorithm
Symmetric Key
20. Which of the following environmental variables reduces the potential for static discharges?
Lets you minimize the attack surface relating to the application
Asymmetric and Hashing
Asset value
Humidity
21. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Implicit deny
Command injection
Configure the IE popup blockers
Vulnerability scanning
22. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des
Multi-factor authentication.
Least privilege
Risk transference
To provide documentation as to who has handled the evidence
23. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
DMZ
ACLs
User rights
MAC
24. Which of the following is a technique designed to obtain information from a specific person?
Gas
Segmentation of each wireless user from other wireless users
The server is missing the default gateway.
Spear phishing
25. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Cross-site scripting
Mandatory vacations
HSM
Footprinting
26. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
NIDS
Rogue access points
Physical control of the data
Decrease the power levels on the WAP
27. Which of the following is true concerning email message encryption by using S/MIME?
Hierarchical list of critical systems
DES
Only the message data is encrypted
Humidity
28. A system administrator could have a user level account and an administrator account to prevent:...
NIDS
Shoulder surfing
escalation of privileges.
Cross-site scripting
29. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
Rogue access point
Business impact analysis
Network Access Control
To provide documentation as to who has handled the evidence
30. Which of the following is used for exchanging secret keys over an insecure public network?
Content filtering
IPSec
MAC filtering
Diffie-Hellman
31. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?
Deny all
Symmetric
Social Engineering attack
Phishing techniques
32. Which of the following uses TCP port 22 by default?
Whaling
VLAN segregation
Dumpster diving
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
33. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?
Vulnerability scanning
80 - 443
Hardware RAID 5 - Software RAID 1
Enact a policy banning users from bringing in personal music devices.
34. Which of the following is true regarding the WTLS protocol?
Determine open ports
Only the message data is encrypted
It is used to provide data encryption for WAP connections.
22
35. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?
quantitative risk assessment
ICMP
IDS
Account disablement
36. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?
Smurf attack
Lets you minimize the attack surface relating to the application
mitigation - acceptance - transference
Asset value
37. Which of the following is the primary difference between a virus and a worm?
Trojans
A worm is self-replicating
Add input validation to forms.
CAC
38. Which of the following is a reason to perform user awareness and training?
To minimize the organizational risk posed by users
Hardware RAID 5 - Software RAID 1
Cognitive passwords
Separation of duties
39. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?
Only the message data is encrypted
The remote router has ICMP blocked.
Baseline reporting
Privacy policy
40. Performing routine security audits is a form of which of the following controls?
Hot and cold aisles
WPA2
Deny all
Detective
41. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
quantitative risk assessment
To provide documentation as to who has handled the evidence
War driving
Privacy policy
42. Which of the following is the default rule found in a corporate firewall's access control list?
Software as a Service (SaaS)
Deny all
NOOP instructions
smurf attacks
43. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
ACLs
The new access point was mis-configured and is interfering with another nearby access point.
Content filtering
NIPS is blocking activities from those specific websites.
44. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
System A fails open. System B fails closed.
Privacy policy
content inspection.
Video surveillance
45. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
Configure the IE popup blockers
Fiber optic
The web site's private key.
Command injection
46. Which of the following facilitates computing for heavily utilized systems and networks?
Protocol analyzer
Hierarchical list of critical systems
ICMP
Provider cloud
47. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Determine open ports
EMI shielding
The web site's public key.
Buffer overflow
48. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
Dumpster diving - Shoulder surfing
Phishing techniques
Protocol analyzer
NIDS
49. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
Accountability
MS-CHAP
VPN concentrator
TCP SYN flood attack
50. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
ARP poisoning
1433
80 - 443
Data Encryption Standard (DES)