SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Use SSH to connect to the Linux shell
TPM
Protocol analyzer
Information disclosure
2. Which of the following BEST describes an intrusion prevention system?
Spear phishing
Bluesnarfing
A system that stops an attack in progress.
Man-in-the-middle
3. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?
TCP SYN flood attack
Run the image through SHA256. Answer: D
Mantrap
The server is missing the default gateway.
4. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Logic Bomb
Spam filters
signing of a user agreement.
ACLs
5. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Cross-site scripting
Check if relaying is denied for unauthorized domains
Smurf attack
HSM
6. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
Baseline reporting
SSH
Birthday - Full name
Rogue access points
7. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
The web site's public key.
Footprinting
Validate input to remove hypertext
ID badges
8. A system administrator could have a user level account and an administrator account to prevent:...
Multi-factor authentication.
escalation of privileges.
signing of a user agreement.
Deny all
9. Which of the following is used when performing a quantitative risk analysis?
Asset value
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
Trojans
Pharming - Logic bomb
10. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Vulnerability scan
25
Cross-site scripting
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
11. Which of the following concepts ensures that the data is only viewable to authorized users?
BIOS
Confidentiality
DMZ
System A fails open. System B fails closed.
12. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
signing of a user agreement.
Separation of duties
SSL
The web site's public key.
13. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Principle of least privilege
ACLs
Shielding
Spear phishing
15. How does a NAT server help protect your network?
Chain of custody
By masking the IP address of internal computers from the Internet
Integrity
Having the offsite location of tapes also be the hot siteservers
16. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Power levels
Buffer overflow
Ensure a proper chain of custody
SNMP (also use to monitor the parameters of network devices)
17. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Power levels
Mantraps
Buffer overflow
content inspection.
18. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
MD5
Spear phishing
25
EMI shielding
19. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
War driving
Separation of duties
Man-in-the-middle
IPSec
20. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
ARP poisoning
Confidentiality - Availability
By masking the IP address of internal computers from the Internet
FTPS
21. Which of the following is a best practice when securing a switch from physical access?
Account disablement
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Disable unused ports
IPSec
22. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
AC filtering - Disabled SSID broadcast
VLAN segregation
WPA Enterprise
User rights
23. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
SNMP (also use to monitor the parameters of network devices)
SYN attacks
Security guard - Proximity reader
Add input validation to forms.
24. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
Phishing techniques
White box
Before and after the imaging process and then hash the forensic image
Rootkit
26. What is the advantage of using application virtualization?
Determine open ports
Determine the potential monetary costs related to a threat
Content filtering
Lets you minimize the attack surface relating to the application
27. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?
The user's PC is missing the authentication agent.
Mantrap
War driving
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
28. Which of the following would need to be configured correctly to allow remote access to the network?
Confidentiality
Evil twin
ACLs
Multi-factor authentication.
29. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
TPM
Virtual servers have the same information security requirements as physical servers.
Principle of least privilege
Rogue access point
30. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?
Forward to different RDP listening ports.
Network Access Control
Proxies
Virtual servers have the same information security requirements as physical servers.
31. Which solution should you use?
se file servers attached to an NAS system.
Network Access Control
To ensure that staff understands what data they are handling and processing
Deny all
32. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
Platform as a Service
Data Encryption Standard (DES)
Symmetric
Having the offsite location of tapes also be the hot siteservers
33. A company that purchases insurance to reduce risk is an example of which of the following?
Baseline reporting
IPv6
Risk transference
Mandatory vacation
34. Which environmental control is part of TEMPEST compliance?
Gas
Shielding
MAC address
Information disclosure
35. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
Software as a Service
Hierarchical list of critical systems
Location that meets power and connectivity requirementsdatacenter
Rogue access points
36. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
Cognitive passwords
Mandatory vacations
DMZ
Vulnerability scan
37. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Implicit deny
S/MIME PGP
Platform as a Service
Protocol analyzer
38. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
Determine the potential monetary costs related to a threat
Ensure a proper chain of custody
Judgment
IKE
39. Which of the following is true regarding the WTLS protocol?
It is used to provide data encryption for WAP connections.
Initial vector
SNMP (also use to monitor the parameters of network devices)
Clustering
40. With which of the following is RAID MOST concerned?
Buffer overflow
Availability
SSL
DMZ
41. Which of the following identifies some of the running services on a system?
Configure the IE popup blockers
Determine open ports
Clean desk policy
Decrease the power levels on the WAP
42. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Before and after the imaging process and then hash the forensic image
Spam filters
Algorithm
MD5
43. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
Hardware RAID 5 - Software RAID 1
Judgment
MD5
TPM
44. What allows for all activities on a network or system to be traced to the user who performed them?
DES
Accountability
Mandated security configurations have been made to the operating system.
Whaling
45. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
Fiber optic
Principle of least privilege
Video surveillance
User rights and permissions reviews
46. What key is used to encrypt an HTTPS session?
Buffer overflow
22
Symmetric
FTPS
47. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
DMZ
Vishing
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Black hat
48. Which of the following would be implemented to allow access to services while segmenting access to the internal network?
By masking the IP address of internal computers from the Internet
Dumpster diving - Shoulder surfing
DMZ
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
49. Which of the following is the BEST way to secure data for the purpose of retention?
Rogue access points
The new access point was mis-configured and is interfering with another nearby access point.
Off-site backup
Vulnerability scanning
50. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
WPA2
Spam filters
Confidentiality
The remote router has ICMP blocked.