SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
TLS
SSL
Confidentiality - Availability
Vishing
2. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?
Blind FTP
80 - 443
Check if relaying is denied for unauthorized domains
ACLs
3. Which of the following is the BEST way to secure data for the purpose of retention?
Hardware RAID 5 - Software RAID 1
White box
Shielding
Off-site backup
4. Which of the following is used for exchanging secret keys over an insecure public network?
Fault tolerance
Diffie-Hellman
Whaling
Implement a change management strategy
5. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?
Mandatory vacation
Disable unused ports
HSM
Spear phishing
6. Separating of duties is valuable in deterring?
Video surveillance
Fraud
MAC address
To minimize the organizational risk posed by users
7. Which of the following is the MAIN reason to require data labeling?
The server is missing the default gateway.
Separation of duties
To ensure that staff understands what data they are handling and processing
MAC address
8. Which of the following are the default ports for HTTP and HTTPS protocols?
Pharming - Logic bomb
ARP poisoning
Baseline reporting
80 - 443
9. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
To provide documentation as to who has handled the evidence
Buffer overflow
SSH
10. Which of the following can prevent an unauthorized employee from entering a data center?
Rogue access point
NIPS is blocking activities from those specific websites.
Security guard - Proximity reader
Risk assessmentproduct Answer: D
11. Upper management decides which risk to mitigate based on cost. This is an example of:
Having the offsite location of tapes also be the hot siteservers
The server is missing the default gateway.
Enact a policy banning users from bringing in personal music devices.
quantitative risk assessment
12. Which of the following is BEST used to prevent ARP poisoning attacks across a network?
Load balancer
Spear phishing
VLAN segregation
Data Encryption Standard (DES)
13. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Vulnerability scanning
Hierarchical list of critical systems
Buffer overflow
14. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Loop protection
Spear phishing
ARP poisoning
se file servers attached to an NAS system.
15. Which of the following is MOST relevant to a buffer overflow attack?
Mandated security configurations have been made to the operating system.
Baseline reporting
Birthday - Full name
NOOP instructions
16. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?
User rights
Accountability
Power levels
VPN concentrator
17. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
TLS
Account disablement
MD5
Dumpster diving
18. Which of the following is used when performing a qualitative risk analysis?
Protocol analyzer
Principle of least privilege
A worm is self-replicating
Judgment
19. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?
Separation of duties
Privacy policy
Firewall - VPN
CCTV
20. Which of the following environmental variables reduces the potential for static discharges?
Humidity
Decrease the power levels on the WAP
Detective
Network Access Control
21. Risk can be managed in the following ways...
Privilege escalation
mitigation - acceptance - transference
1433
HSM
22. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?
Gas
Baseline reporting
Footprinting
IKE
23. Which of the following is not an asymmetric system?
Steganography
Fraud
SYN attacks
DES
24. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?
Hardware RAID 5 - Software RAID 1
Determine the potential monetary costs related to a threat
Block port 23 on the network firewall.
Mandatory vacations
25. Which of the following uses TCP port 22 by default?
Physical control of the data
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
Algorithm
S/MIME PGP
26. The detection of a NOOP sled is an indication of which of the following attacks?
Integrity and Authentication
Buffer overflow
IKE
Polymorphic
27. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Rogue access points
Change Management System
FTPS
Use SSH to connect to the Linux shell
28. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
NIPS is blocking activities from those specific websites.
Vishing
Baseline reporting
To minimize the organizational risk posed by users
29. Which of the following should be enabled to ensure only certain wireless clients can access the network?
Off-site backup
Principle of least privilege
Lets you minimize the attack surface relating to the application
MAC filtering
30. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?
VLAN segregation
Data Encryption Standard (DES)
Cross-site scripting
Vulnerability scanner
31. Which of the following is the MOST secure method of utilizing FTP?
Detective
Segmentation of each wireless user from other wireless users
Software as a Service (SaaS)
FTPS
32. Which of the following allows a security administrator to set device traps?
Baseline reporting
Load balancer
SNMP (also use to monitor the parameters of network devices)
Install a network-based IDS
33. Which of the following assists in identifying if a system was properly handled during transport?
Chain of custody
Vulnerability scanning
The development team is transferring data to test systems using SFTP and SCP.
Clean desk policy
34. What is the advantage of using application virtualization?
Change Management System
Validate input to remove hypertext
Lets you minimize the attack surface relating to the application
Symmetric
35. Which of the following security threats does shredding mitigate?
Dumpster diving
MAC
CCTV
BIOS
36. Which of the following is a method to prevent ad-hoc configuration mistakes?
White box
WPA2
Implement a change management strategy
Run the image through SHA256. Answer: D
37. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?
Dumpster diving - Shoulder surfing
Deny all
Tailgating
Block port 23 on the network firewall.
38. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
Forward to different RDP listening ports.
Account disablement
Software as a Service (SaaS)
MAC
39. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?
Hierarchical list of critical systems
Integrity
System A fails open. System B fails closed.
PEAP-TLS
40. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin
Social Engineering attack
Symmetric Key
WPA Enterprise
Buffer overflow
41. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
Hardware RAID 5 - Software RAID 1
Check if relaying is denied for unauthorized domains
Buffer overflow
System A fails open. System B fails closed.
43. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
Mandatory vacations
Implement a change management strategy
Buffer overflow
Change Management System
44. Which of the following encryption algorithms can be used in PGP for data encryption?
IDEA and TripleDes
White box
DoS
Vishing
45. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
quantitative risk assessment
ID badges
Trojans
System A fails open. System B fails closed.
46. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?
Hierarchical list of critical systems
Baseline reporting
DMZ
Bluesnarfing
47. On-going annual awareness security training should be coupled with:..
Diffie-Hellman
Determine open ports
signing of a user agreement.
Mantrap
48. Which of the following is MOST commonly a part of routine system audits?
Physical control of the data
Humidity
To minimize the organizational risk posed by users
User rights and permissions reviews
49. Which of the following should be performed on a computer to protect the operating system from malicious software?
Asset value
Trojans
Virtual servers have the same information security requirements as physical servers.
Disable unused services - Update HIPS signatures
50. What key is used to encrypt an HTTPS session?
Platform as a Service
Symmetric
The new access point was mis-configured and is interfering with another nearby access point.
MAC filtering