SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are performing risk assessment for an organization. What should you do during impact assessment?
Confidentiality - Availability
Determine the potential monetary costs related to a threat
Risk assessmentproduct Answer: D
quantitative risk assessment
2. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Run the image through SHA256. Answer: D
Clean desk policy
Dumpster diving
Least privilege
3. Which solution should you use?
Decrease the power levels on the WAP
Detective
se file servers attached to an NAS system.
VLAN
4. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Firewall rulesflow of network traffic at the edge of the network
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
IPv6
WPA Enterprise
5. Risk can be managed in the following ways...
Spear phishing
mitigation - acceptance - transference
Ensure a proper chain of custody
Run the image through SHA256. Answer: D
6. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
Asymmetric and Hashing
IKE
Virtual servers have the same information security requirements as physical servers.
quantitative risk assessment
7. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
Dumpster diving
ARP poisoning
MAC address
Vishing
8. What port does the Domain Name Service (DNS) use by default?
Black hat
IPSec
53
WPA2-PSK
9. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Confidentiality - Availability
Algorithm
DNS spoofing
Protocol analyzer
10. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
DNS spoofing
IPSec
Block port 23 on the network firewall.
SNMP (also use to monitor the parameters of network devices)
11. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
War driving
Risk assessmentproduct Answer: D
The PC has become part of a botnet.
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
12. Which of the following manages peer authentication and key exchange for an IPSec connection?
IKE
The user's PC is missing the authentication agent.
SYN attacks
VLAN segregation
13. The detection of a NOOP sled is an indication of which of the following attacks?
Buffer overflow
Segmentation of each wireless user from other wireless users
Forward to different RDP listening ports.
Protocol analyzer
14. Which of the following allows a security administrator to set device traps?
SNMP (also use to monitor the parameters of network devices)
Dumpster diving
Deny all
Mandatory vacation
15. Which of the following is a reason to perform user awareness and training?
DES
SSL
Fault tolerance
To minimize the organizational risk posed by users
16. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?
Spear phishing
Algorithm
Configure the IE popup blockers
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
17. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces
BIOS
Deny all
Install a network-based IDS
Network Access Control
18. For which of the following is centralized key management most complicated?
IDEA and TripleDes
Spam filters
Symmetric Key
MS-CHAP
19. What are typical elements of authentication as part of physical access controls?
Trojans
Least privilege
Bluesnarfing
ID badges
20. Which of the following should be considered when trying to prevent somebody from capturing network traffic?
Firewall rulesflow of network traffic at the edge of the network
Integrity
Steganography
EMI shielding
21. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Diffie-Hellman
DoS
Humidity
Spear phishing
22. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
quantitative risk assessment
Spear phishing
CCTV
Location that meets power and connectivity requirementsdatacenter
23. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
White box
Having the offsite location of tapes also be the hot siteservers
Mandated security configurations have been made to the operating system.
Botnet
24. Which of the following is used for exchanging secret keys over an insecure public network?
Change Management System
Disable unused services - Update HIPS signatures
Diffie-Hellman
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
25. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Having the offsite location of tapes also be the hot siteservers
extremely slow and numerous antivirus alerts
Gas
Business impact analysis
26. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
Having the offsite location of tapes also be the hot siteservers
System A fails open. System B fails closed.
Check if relaying is denied for unauthorized domains
Vulnerability scanner
27. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Mantraps
Bluesnarfing
Forward to different RDP listening ports.
Pharming - Logic bomb
28. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
mitigation - acceptance - transference
Organize data based on severity and asset value.
Account disablement
IPSec
29. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis
MAC address
Account disablement
HSM
Provider cloud
30. Which of the following identifies some of the running services on a system?
Determine open ports
escalation of privileges.
Having the offsite location of tapes also be the hot siteservers
MD5
31. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Confidentiality
Trojans
Hot and cold aisles
32. Which of the following describes a passive attempt to identify weaknesses?
Vulnerability scanning
Validate input to remove hypertext
IPSec
Loop protection
33. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
VPN concentrator
NIDS
IPv6
The web site's private key.
34. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
The PC has become part of a botnet.
extremely slow and numerous antivirus alerts
The development team is transferring data to test systems using SFTP and SCP.
Organize data based on severity and asset value.
35. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?
Vishing
Forward to different RDP listening ports.
Implicit deny
MD5
36. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
The server is missing the default gateway.
MS-CHAP
Social Engineering attack
Multi-factor authentication.
37. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
IPSec
Least privilege
25
Hardware RAID 5 - Software RAID 1
38. Which of the following assists in identifying if a system was properly handled during transport?
Software as a Service (SaaS)
Chain of custody
Mantrap
Birthday - Full name
39. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi
NIPS is blocking activities from those specific websites.
ID badges
Pharming - Logic bomb
HSM
40. Which of the following is the primary difference between a virus and a worm?
AES and TKIP
Pharming - Logic bomb
Mantrap
A worm is self-replicating
41. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?
Logic Bomb
TLS
Protocol analyzer
Vulnerability scan
42. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
MS-CHAP
VPN concentrator
Implicit deny
Change Management System
43. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?
Vulnerability scanning
Disable unused services - Update HIPS signatures
Account disablement
Spear phishing
44. Which of the following BEST explains the security benefit of a standardized server image?
Mandated security configurations have been made to the operating system.
Cross-site scripting
User rights
Firewall - VPN
45. NIDS can also be used to help identify...
Tailgating
Algorithm
smurf attacks
Having the offsite location of tapes also be the hot siteservers
46. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?
ICMP
Information disclosure
Load balancer
Polymorphic
47. Which of the following concepts ensures that the data is only viewable to authorized users?
Confidentiality
MAC address
Ensure a proper chain of custody
22
48. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
Firewall - VPN
ICMP
Visibility - Accessibility - Neighborhood crime rate
Principle of least privilege
49. A system administrator could have a user level account and an administrator account to prevent:...
escalation of privileges.
ACLs
Loop protection
Fraud
50. Webmail is classified under which of the following cloud-based technologies?
Tailgating
Software as a Service (SaaS)
Use SSH to connect to the Linux shell
War driving
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests