SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?
AC filtering - Disabled SSID broadcast
Phishing techniques
Baseline reporting
Firewall rulesflow of network traffic at the edge of the network
2. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
Mandatory vacations
Network Access Control
Rootkit
VLAN segregation
3. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
TCP SYN flood attack
Software as a Service
Implicit deny
Birthday - Full name
4. Which of the following access control models allows classification and labeling of objects?
Hierarchical list of critical systems
IDS
Confidentiality
MAC
5. Which of the following is MOST likely to be the last rule contained on any firewall?
Dumpster diving - Shoulder surfing
Asymmetric and Hashing
Implicit deny
BIOS
6. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
extremely slow and numerous antivirus alerts
Phishing techniques
Separation of duties
SSH
7. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Trojans
Evil twin
Block port 23 on the network firewall.
se file servers attached to an NAS system.
8. What port does the Domain Name Service (DNS) use by default?
53
Baseline reporting
AES and TKIP
Clean desk policy
9. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
Change Management System
TCP SYN flood attack
Implicit deny
Detective
10. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
The PC has become part of a botnet.
Dumpster diving - Shoulder surfing
Phishing techniques
Change Management System
11. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Mandatory vacation
White box
Integrity and Authentication
PEAP-TLS
12. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
DAC
Firewall - VPN
IPSec
Ensure a proper chain of custody
13. Which of the following is the primary difference between a virus and a worm?
Loop protection
A worm is self-replicating
Tailgating
Symmetric
14. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
Fault tolerance
Least privilege
Risk assessmentproduct Answer: D
Provider cloud
15. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?
Platform as a Service
Accountability
VLAN segregation
Whaling
16. With which of the following is RAID MOST concerned?
Mantraps
Determine the potential monetary costs related to a threat
Availability
Software as a Service (SaaS)
17. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?
Steganography
Hierarchical list of critical systems
SSH
WPA2-PSK
18. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Pharming - Logic bomb
Load balancer
Block port 23 on the network firewall.
19. Which of the following BEST explains the security benefit of a standardized server image?
Mandated security configurations have been made to the operating system.
Configure the IE popup blockers
Baseline reporting
Principle of least privilege
20. Which of the following devices would allow a technician to view IP headers on a data packet?
MAC
Protocol analyzer
quantitative risk assessment
mitigation - acceptance - transference
21. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
Botnet
Determine open ports
ICMP
TPM
22. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
S/MIME PGP
Video surveillance
DMZ
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
23. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?
22
Decrease the power levels on the WAP
Determine open ports
MD5
24. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
Provider cloud
VLAN segregation
WPA2-PSK
War driving
25. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m
EMI shielding
Dumpster diving
Cross-site scripting
The new access point was mis-configured and is interfering with another nearby access point.
26. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
content inspection.
Botnet
Lets you minimize the attack surface relating to the application
DAC
27. Which of the following is an unauthorized wireless router that allows access to a secure network?
Cross-site scripting
se file servers attached to an NAS system.
VPN concentrator
Rogue access point
28. Which of the following describes when forensic hashing should occur on a drive?
Botnet
Before and after the imaging process and then hash the forensic image
Clean desk policy
By masking the IP address of internal computers from the Internet
29. Which of the following environmental variables reduces the potential for static discharges?
Protocol analyzer
Load balancer
Rootkit
Humidity
30. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
Rogue access point
The PC has become part of a botnet.
MAC
FTPS
31. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?
Protocol analyzer
Symmetric Key
Physical control of the data
Run the image through SHA256. Answer: D
32. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
Least privilege
Check if relaying is denied for unauthorized domains
Location that meets power and connectivity requirementsdatacenter
Forward to different RDP listening ports.
33. NIDS can also be used to help identify...
Confidentiality - Availability
smurf attacks
HSM
Vulnerability scanning
34. Which of the following should NOT be used with username/password authentication?
Check if relaying is denied for unauthorized domains
Mandatory vacations
VPN concentrator
Cognitive passwords
35. Which of the following is a management control type?
25
Vulnerability scanning
Load balancer
Firewall rulesflow of network traffic at the edge of the network
36. You are performing risk assessment for an organization. What should you do during impact assessment?
Bluesnarfing
Determine the potential monetary costs related to a threat
FTPS
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
37. Which of the following is specific to a buffer overflow attack?
Physical control of the data
Phishing techniques
Ensure a proper chain of custody
Initial vector
38. For which of the following is centralized key management most complicated?
Power levels
Symmetric Key
Security guard - Proximity reader
IPSec
39. Which of the following uses TCP port 22 by default?
Confidentiality - Availability
ACLs
Birthday - Full name
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
40. Which of the following is a technique designed to obtain information from a specific person?
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Spear phishing
Buffer overflow
Vishing
41. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
The user's PC is missing the authentication agent.
Dumpster diving
White box
The remote router has ICMP blocked.
42. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
Asymmetric and Hashing
TPM
TLS
Business impact analysis
43. In which of the following locations would a forensic analyst look to find a hooked process?
Physical control of the data
Business impact analysis
BIOS
Disable unused ports
44. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Vulnerability scanning
Segmentation of each wireless user from other wireless users
IPSec
Forward to different RDP listening ports.
45. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Add input validation to forms.
Buffer overflow
IPSec
Lets you minimize the attack surface relating to the application
46. Which of the following is a detective security control?
CCTV
Birthday - Full name
Lets you minimize the attack surface relating to the application
Virtual servers have the same information security requirements as physical servers.
47. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Use SSH to connect to the Linux shell
quantitative risk assessment
Risk transference
Information disclosure
48. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?
escalation of privileges.
AC filtering - Disabled SSID broadcast
Shielding
Physical control of the data
49. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
MAC address
MAC
The user's PC is missing the authentication agent.
Firewall rulesflow of network traffic at the edge of the network
50. Which of the following attacks would password masking help mitigate?
Command injection
Availability
Shoulder surfing
Enact a policy banning users from bringing in personal music devices.
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests