SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following will provide the HIGHEST level of wireless network security?
The server is missing the default gateway.
WPA2
WPA Enterprise
Detective
2. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
VLAN
Cognitive passwords
TPM
Clean desk policy
3. Which of the following environmental variables reduces the potential for static discharges?
IKE
se file servers attached to an NAS system.
Install a network-based IDS
Humidity
4. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?
Footprinting
MAC
Principle of least privilege
AES and TKIP
5. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
Account disablement
Clean desk policy
Content filtering
Trojans
6. Which of the following includes a photo and can be used for identification?
Clean desk policy
1433
CAC
ARP poisoning
7. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?
Algorithm
White box
Command injection
Man-in-the-middle
8. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?
Gas
25
Logic Bomb
se file servers attached to an NAS system.
9. Which of the following BEST describes the proper method and reason to implement port security?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
AES and TKIP
Blind FTP
SSH - SCP - and SFTP (the MOST secure method to transfer files from a host machine)
10. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?
11. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?
DoS
Account disablement
Initial vector
quantitative risk assessment
12. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?
White box
SSL
22
Hardware RAID 5 - Software RAID 1
13. Which of the following is MOST commonly a part of routine system audits?
User rights and permissions reviews
Location that meets power and connectivity requirementsdatacenter
PEAP-TLS
Vulnerability scan
14. MAC filtering is a form of which of the following?
White box
smurf attacks
Network Access Control
Firewall rulesflow of network traffic at the edge of the network
15. In which of the following locations would a forensic analyst look to find a hooked process?
Protocol analyzer
BIOS
A system that stops an attack in progress.
1433
16. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?
Deny all
Disable unused ports
Use SSH to connect to the Linux shell
Vulnerability scan
17. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
Segmentation of each wireless user from other wireless users
Integrity and Authentication
Protocol analyzer
SSH
18. Which of the following is a security control that is lost when using cloud computing?
Fault tolerance
Privilege escalation
TPM
Physical control of the data
19. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
Detective
Hot and cold aisles
Vishing
IPSec
20. Which environmental control is part of TEMPEST compliance?
To ensure that staff understands what data they are handling and processing
Shielding
AC filtering - Disabled SSID broadcast
Ensure a proper chain of custody
21. DRPs should contain which of the following?
Vulnerability scanning
Hierarchical list of critical systems
User rights
Privacy policy
22. On-going annual awareness security training should be coupled with:..
IPSec
Whaling
signing of a user agreement.
53
23. Which of the following should be installed to prevent employees from receiving unsolicited emails?
Shielding
It is used to provide data encryption for WAP connections.
MAC
Spam filters
24. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?
80 - 443
ARP poisoning
Integrity
Ensure a proper chain of custody
25. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur
Location that meets power and connectivity requirementsdatacenter
Video surveillance
The web site's private key.
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
26. Which of the following assists in identifying if a system was properly handled during transport?
Rogue access points
Risk transference
WPA Enterprise
Chain of custody
27. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers
Confidentiality
Vulnerability scan
Software as a Service
Pharming - Logic bomb
28. Which of the following would need to be configured correctly to allow remote access to the network?
Mandatory vacation
IDEA and TripleDes
ACLs
Fiber optic
29. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?
A system that stops an attack in progress.
System A fails open. System B fails closed.
Gas
Lets you minimize the attack surface relating to the application
30. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?
Fiber optic
mitigation - acceptance - transference
Mandatory vacation
Firewall rulesflow of network traffic at the edge of the network
31. Which of the following facilitates computing for heavily utilized systems and networks?
Privilege escalation
The server is missing the default gateway.
Initial vector
Provider cloud
32. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb
PEAP-TLS
Vulnerability scan
The PC has become part of a botnet.
SNMP (also use to monitor the parameters of network devices)
33. Which of the following is the primary difference between a virus and a worm?
Risk assessmentproduct Answer: D
Mandated security configurations have been made to the operating system.
A worm is self-replicating
To minimize the organizational risk posed by users
34. Which of the following allows a security administrator to set device traps?
SNMP (also use to monitor the parameters of network devices)
Account disablement
VLAN
Rogue access points
35. Which of the following MUST a programmer implement to prevent cross-site scripting?
Whaling
Tailgating
Cross-site scripting
Validate input to remove hypertext
36. Used in conjunction which of the following are PII?
Evil twin
CAC
SNMP (also use to monitor the parameters of network devices)
Birthday - Full name
37. What are typical elements of authentication as part of physical access controls?
ID badges
VPN concentrator
The user's PC is missing the authentication agent.
Shielding
38. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
IPSec
NOOP instructions
SSH
Hierarchical list of critical systems
39. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
User rights
Location that meets power and connectivity requirementsdatacenter
MAC
VPN concentrator
40. Which of the following manages peer authentication and key exchange for an IPSec connection?
Availability
IKE
Privilege escalation
Platform as a Service
41. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?
Provider cloud
Implement a change management strategy
Virtual servers have the same information security requirements as physical servers.
NIDS
42. Which of the following security threats does shredding mitigate?
The web site's private key.
Validate input to remove hypertext
It is used to provide data encryption for WAP connections.
Dumpster diving
43. What port does the Domain Name Service (DNS) use by default?
53
Software as a Service
EMI shielding
ACLs
44. Which of the following describes when forensic hashing should occur on a drive?
Judgment
The server is missing the default gateway.
ICMP
Before and after the imaging process and then hash the forensic image
45. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is
Shielding
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
Cross-site scripting
VPN concentrator
46. Which of the following is used when performing a qualitative risk analysis?
Botnet
Judgment
Software as a Service
The web site's public key.
47. Which of the following should NOT be used with username/password authentication?
Security guard - Proximity reader
Cognitive passwords
MAC
Detective
48. With which of the following is RAID MOST concerned?
Proxies
WPA Enterprise
Availability
Botnet
49. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?
MAC
MAC
Firewall rulesflow of network traffic at the edge of the network
Spear phishing
50. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
Logic Bomb
Ensure a proper chain of custody
Spam filters
TLS