SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.
BIOS
DES
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Cross-site scripting
2. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?
Segmentation of each wireless user from other wireless users
Decrease the power levels on the WAP
HSM
TLS
3. Which of the following risks may result from improper use of social networking and P2P software?
White box
Validate input to remove hypertext
Information disclosure
Rogue access points
4. Which of the following facilitates computing for heavily utilized systems and networks?
IPSec
Protocol analyzer
Provider cloud
Black hat
5. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
FTPS
Rogue access points
Organize data based on severity and asset value.
Cross-site scripting
6. Which of the following are accomplished when a message is digitally signed?
Configure the IE popup blockers
mitigation - acceptance - transference
IDEA and TripleDes
Integrity and Authentication
7. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?
War driving
Vulnerability scan
Mandated security configurations have been made to the operating system.
HSM
8. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?
BIOS
The remote router has ICMP blocked.
signing of a user agreement.
Phishing techniques
9. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?
SNMP (also use to monitor the parameters of network devices)
Buffer overflow
Multi-factor authentication.
The server is missing the default gateway.
10. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
Bluesnarfing
Buffer overflow
Availability
NIDS
11. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
Vishing
smurf attacks
It is used to provide data encryption for WAP connections.
IDS
12. Which of the following environmental variables reduces the potential for static discharges?
Humidity
Vishing
Loop protection
Protocol analyzer
13. What key is used to encrypt an HTTPS session?
Block port 23 on the network firewall.
Symmetric
Availability
Principle of least privilege
14. Which of the following should be performed on a computer to protect the operating system from malicious software?
Vulnerability scanning
Forward to different RDP listening ports.
Disable unused services - Update HIPS signatures
Judgment
15. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp
WPA2-PSK
Principle of least privilege
ACLs
IPv6
16. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
Spam filters
Organize data based on severity and asset value.
Botnet
White box
17. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
Shoulder surfing
Rootkit
1433
Confidentiality
18. Which of the following security threats does shredding mitigate?
Dumpster diving
Deny all
War driving
Determine open ports
19. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?
Proxies
TCP SYN flood attack
Buffer overflow
Accountability
20. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
To minimize the organizational risk posed by users
User rights and permissions reviews
Clean desk policy
Symmetric Key
21. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
Shielding
Configure the IE popup blockers
MAC address
extremely slow and numerous antivirus alerts
22. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
Memory - network processes - and system processesserver. If the computer is powered off
Vulnerability scan
22
WPA Enterprise
23. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
Vulnerability scanning
AES and TKIP
Having the offsite location of tapes also be the hot siteservers
Shoulder surfing
24. Which of the following threats corresponds with an attacker targeting specific employees of a company?
Asset value
Fault tolerance
War driving
Spear phishing
25. DRPs should contain which of the following?
Hierarchical list of critical systems
80 - 443
Vulnerability scan
Block port 23 on the network firewall.
26. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives
Vulnerability scanner
DMZ
To minimize the organizational risk posed by users
The remote router has ICMP blocked.
27. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
War driving
To provide documentation as to who has handled the evidence
Privilege escalation
A worm is self-replicating
28. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?
25
DNS spoofing
Enact a policy banning users from bringing in personal music devices.
Mandatory vacations
29. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?
Integrity
Software as a Service
Determine open ports
ACLs
30. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?
Virtual servers have the same information security requirements as physical servers.
Determine open ports
HSM
Trojans
31. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?
BIOS
Buffer overflow
The server is missing the default gateway.
TCP SYN flood attack
32. Which environmental control is part of TEMPEST compliance?
Shielding
CAC
Mandatory vacation
Accountability
33. Which of the following is the primary difference between a virus and a worm?
S/MIME PGP
A worm is self-replicating
Implement a change management strategy
AC filtering - Disabled SSID broadcast
34. Which of the following is MOST commonly a part of routine system audits?
Privacy policy
SNMP (also use to monitor the parameters of network devices)
User rights and permissions reviews
The PC has become part of a botnet.
35. Which of the following is a best practice to identify fraud from an employee in a sensitive position?
WPA Enterprise
Mandatory vacations
Spear phishing
SYN attacks
36. Which of the following describes when forensic hashing should occur on a drive?
Blind FTP
IPSec
Forward to different RDP listening ports.
Before and after the imaging process and then hash the forensic image
37. Which of the following BEST describes an intrusion prevention system?
A system that stops an attack in progress.
AC filtering - Disabled SSID broadcast
Check if relaying is denied for unauthorized domains
Loop protection
38. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?
The web site's private key.
Cross-site scripting
IPSec
Least privilege
39. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
AC filtering - Disabled SSID broadcast
Rogue access points
DNS spoofing
ARP poisoning
40. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?
DMZ
Trojans
Provide an appropriate ambient temperature and Maintain appropriate humidity levels
User rights
41. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
Humidity
Cognitive passwords
CCTV
Implicit deny
42. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?
War driving
Judgment
Hot and cold aisles
Protocol analyzer
43. Which of the following is the MOST secure method of utilizing FTP?
FTPS
Change Management System
Lets you minimize the attack surface relating to the application
MD5
44. Which of the following is a detective security control?
Network Access Control
CCTV
53
Shielding
45. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Baseline reporting
War driving
Load balancer
Loop protection
46. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?
Vulnerability scanner
Phishing techniques
Mandatory vacations
Content filtering
47. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?
se file servers attached to an NAS system.
Symmetric
Buffer overflow
Change Management System
48. Which of the following are important physical security considerations when choosing a location for a new remote branch office?
Visibility - Accessibility - Neighborhood crime rate
DoS
Validate input to remove hypertext
VPN concentrator
49. Which of the following should be enabled to ensure only certain wireless clients can access the network?
Tailgating
MAC filtering
DMZ
Account disablement
50. Which of the following reduces the likelihood of a single point of failure when a server fails?
IPSec
DES
The new access point was mis-configured and is interfering with another nearby access point.
Clustering