SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is true regarding the WTLS protocol?
DoS
escalation of privileges.
To minimize the organizational risk posed by users
It is used to provide data encryption for WAP connections.
2. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Software as a Service (SaaS)
Footprinting
Cross-site scripting
22
3. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
Social Engineering attack
Hierarchical list of critical systems
Organize data based on severity and asset value.
Botnet
4. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Security guard - Proximity reader
Firewall rulesflow of network traffic at the edge of the network
Algorithm
5. Which environmental control is part of TEMPEST compliance?
Buffer overflow
Shielding
Hierarchical list of critical systems
VLAN segregation
6. NIDS can also be used to help identify...
smurf attacks
WPA2
Determine open ports
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
7. What allows for all activities on a network or system to be traced to the user who performed them?
Accountability
ICMP
Logic Bomb
Buffer overflow
8. What is the advantage of using application virtualization?
Lets you minimize the attack surface relating to the application
Mandated security configurations have been made to the operating system.
Baseline reporting
IPv6
9. Which of the following protocols requires the use of a CA based authentication process?
PEAP-TLS
Platform as a Service
The development team is transferring data to test systems using SFTP and SCP.
NOOP instructions
10. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
signing of a user agreement.
MAC address
Protocol analyzer
Check if relaying is denied for unauthorized domains
11. Which of the following is a technique designed to obtain information from a specific person?
Spear phishing
DAC
Integrity and Authentication
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
12. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
DoS
Forward to different RDP listening ports.
Deny all
NIDS
13. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
Data Encryption Standard (DES)
Principle of least privilege
HSM
Protocol analyzer
14. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Logic Bomb
Mandatory vacation
FTPS
15. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
Check if relaying is denied for unauthorized domains
Detective
NIDS
War driving
16. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Before and after the imaging process and then hash the forensic image
IPSec
Vulnerability scan
MS-CHAP
17. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
VPN concentrator
HSM
By masking the IP address of internal computers from the Internet
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
18. How does a NAT server help protect your network?
Logic Bomb
Command injection
IPSec
By masking the IP address of internal computers from the Internet
19. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?
Vulnerability scanner
ICMP
Firewall - VPN
Fault tolerance
20. Webmail is classified under which of the following cloud-based technologies?
TCP SYN flood attack
AC filtering - Disabled SSID broadcast
Firewall - VPN
Software as a Service (SaaS)
21. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?
Evil twin
Platform as a Service
WPA2
Diffie-Hellman
22. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to
Vulnerability scan
VPN concentrator
Algorithm
Enact a policy banning users from bringing in personal music devices.
23. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
IPSec
Software as a Service
Privacy policy
Protocol analyzer
24. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Decrease the power levels on the WAP
25
Power levels
Judgment
25. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?
Diffie-Hellman
Clean desk policy
MAC filtering
Command injection
26. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. Which of the following is a reason to perform user awareness and training?
To minimize the organizational risk posed by users
The user's PC is missing the authentication agent.
IDEA and TripleDes
ARP poisoning
28. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces
The development team is transferring data to test systems using SFTP and SCP.
IKE
Install a network-based IDS
Protocol analyzer
29. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
Check if relaying is denied for unauthorized domains
Mantraps
User rights
Fiber optic
30. What key is used to encrypt an HTTPS session?
Dumpster diving
DMZ
Symmetric
Disable unused ports
31. Which of the following reduces the likelihood of a single point of failure when a server fails?
25
Mandatory vacation
Clustering
Fault tolerance
32. What are typical elements of authentication as part of physical access controls?
ID badges
mitigation - acceptance - transference
Software as a Service
Cognitive passwords
33. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
SSL
Trojans
Install a network-based IDS
Mantraps
34. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Diffie-Hellman
Logic Bomb
It is used to provide data encryption for WAP connections.
Botnet
35. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Implicit deny
Risk transference
Organize data based on severity and asset value.
DoS
36. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?
S/MIME PGP
DMZ
Hierarchical list of critical systems
The new access point was mis-configured and is interfering with another nearby access point.
37. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
MD5
Buffer overflow
Mantraps
Memory - network processes - and system processesserver. If the computer is powered off
38. Which of the following should NOT be used with username/password authentication?
Change Management System
Cognitive passwords
Footprinting
System A fails open. System B fails closed.
39. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Fiber optic
Firewall - VPN
content inspection.
Content filtering
40. Which of the following is the MOST secure method of utilizing FTP?
FTPS
War driving
content inspection.
25
41. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
Block port 23 on the network firewall.
VPN concentrator
DoS
Data Encryption Standard (DES)
42. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Clean desk policy
Logic Bomb
Judgment
Only the message data is encrypted
43. Which of the following port numbers is used for SCP by default?
Steganography
22
25
escalation of privileges.
44. A company that purchases insurance to reduce risk is an example of which of the following?
Risk transference
Organize data based on severity and asset value.
Risk assessmentproduct Answer: D
It is used to provide data encryption for WAP connections.
45. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Logic Bomb
Protocol analyzer
Blind FTP
NOOP instructions
46. Isolation mode on an AP provides which of the following functionality types?
Segmentation of each wireless user from other wireless users
EMI shielding
Spear phishing
Tailgating
47. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Hierarchical list of critical systems
Hot and cold aisles
Spam filters
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
48. Which of the following facilitates computing for heavily utilized systems and networks?
Physical control of the data
Vishing
Provider cloud
quantitative risk assessment
49. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Vulnerability scanning
IPSec
Hierarchical list of critical systems
Tailgating
50. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Data Encryption Standard (DES)
Judgment
VLAN
Cross-site scripting