SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
Privacy policy
Phishing techniques
Botnet
DoS
2. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?
White box
Determine open ports
VLAN
Platform as a Service
3. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. What allows for all activities on a network or system to be traced to the user who performed them?
Having the offsite location of tapes also be the hot siteservers
Virtual servers have the same information security requirements as physical servers.
Accountability
To provide documentation as to who has handled the evidence
5. Which of the following is the primary difference between a virus and a worm?
DNS spoofing
TPM
ID badges
A worm is self-replicating
6. Which of the following protocols requires the use of a CA based authentication process?
Rogue access points
Principle of least privilege
PEAP-TLS
Judgment
7. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?
TCP SYN flood attack
Video surveillance
Content filtering
The development team is transferring data to test systems using SFTP and SCP.
8. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces
Mandated security configurations have been made to the operating system.
Birthday - Full name
Install a network-based IDS
Man-in-the-middle
9. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Diffie-Hellman
Check if relaying is denied for unauthorized domains
Determine the potential monetary costs related to a threat
25
10. What asymmetric key is used to encrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
TPM
Fault tolerance
HSM
signing of a user agreement.
12. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
22
Confidentiality
Tailgating
Evil twin
13. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Blind FTP
Determine the potential monetary costs related to a threat
Birthday - Full name
25
14. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
Firewall rulesflow of network traffic at the edge of the network
Social Engineering attack
DAC
Vishing
15. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Cross-site scripting
The PC has become part of a botnet.
Decrease the power levels on the WAP
NIDS
16. Which of the following should be enabled to ensure only certain wireless clients can access the network?
VLAN segregation
Vulnerability scan
Fault tolerance
MAC filtering
17. Which of the following describes when forensic hashing should occur on a drive?
Firewall - VPN
Protocol analyzer
System A fails open. System B fails closed.
Before and after the imaging process and then hash the forensic image
18. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
Implement a change management strategy
Man-in-the-middle
Install a network-based IDS
extremely slow and numerous antivirus alerts
19. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Rogue access point
Cross-site scripting
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
53
20. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
content inspection.
Ensure a proper chain of custody
Virtual servers have the same information security requirements as physical servers.
PEAP-TLS
21. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
MD5
To provide documentation as to who has handled the evidence
TCP SYN flood attack
ARP poisoning
22. What asymmetric key is used to decrypt when using HTTPS?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. With which of the following is RAID MOST concerned?
CAC
Availability
Enact a policy banning users from bringing in personal music devices.
Asset value
24. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel
WPA Enterprise
Command injection
Spear phishing
The development team is transferring data to test systems using SFTP and SCP.
25. Actively monitoring data streams in search of malicious code or behavior is an example of..
BIOS
User rights
content inspection.
Botnet
26. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Baseline reporting
Fault tolerance
Asymmetric and Hashing
Video surveillance
27. Which of the following security threats does shredding mitigate?
Hardware RAID 5 - Software RAID 1
Validate input to remove hypertext
Dumpster diving
War driving
28. Which of the following uses TCP port 22 by default?
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Vishing
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
IKE
29. Which of the following is true regarding the WTLS protocol?
It is used to provide data encryption for WAP connections.
Least privilege
Buffer overflow
Confidentiality - Availability
30. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?
Loop protection
ACLs
Determine the potential monetary costs related to a threat
Whaling
31. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
NIDS
Separation of duties
Risk assessmentproduct Answer: D
Business impact analysis
32. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?
Black hat
Determine the potential monetary costs related to a threat
IPSec
Disable unused services - Update HIPS signatures
33. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?
IPv6
Business impact analysis
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Disable unused services - Update HIPS signatures
34. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
Network Access Control
Trojans
Confidentiality
SSH
35. Which of the following is another name for a malicious attacker?
Organize data based on severity and asset value.
Mandatory vacations
Black hat
Lets you minimize the attack surface relating to the application
36. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Buffer overflow
Gas
Confidentiality
53
37. Which of the following is the BEST choice for encryption on a wireless network?
se file servers attached to an NAS system.
WPA2-PSK
Lets you minimize the attack surface relating to the application
Spear phishing
38. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
Vulnerability scanner
Check if relaying is denied for unauthorized domains
CCTV
Buffer overflow
39. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
Principle of least privilege
Check if relaying is denied for unauthorized domains
Bluesnarfing
Fault tolerance
40. Which of the following BEST describes an intrusion prevention system?
ID badges
A system that stops an attack in progress.
Implicit deny
Asset value
41. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
Organize data based on severity and asset value.
1433
Shielding
Initial vector
42. Which of the following is NOT an application layer security protocol?
Risk transference
The development team is transferring data to test systems using SFTP and SCP.
NOOP instructions
IPSec
43. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
25
Provider cloud
Social Engineering attack
44. Separating of duties is valuable in deterring?
Whaling
Dumpster diving
Fraud
Platform as a Service
45. Which of the following describes a passive attempt to identify weaknesses?
Spam filters
To minimize the organizational risk posed by users
CAC
Vulnerability scanning
46. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Provider cloud
Content filtering
Visibility - Accessibility - Neighborhood crime rate
Buffer overflow
47. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
HSM
White box
Cross-site scripting
Spear phishing
48. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Firewall rulesflow of network traffic at the edge of the network
Symmetric
Rootkit
Asset value
49. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?
Fraud
Cross-site scripting
1433
WPA2
50. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Algorithm
TCP SYN flood attack
Disable unused ports
Business impact analysis