SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security + Exam
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?
TCP SYN flood attack
Cross-site scripting
White box
Polymorphic
2. For which of the following is centralized key management most complicated?
IPSec
Symmetric Key
Evil twin
The security posture is enabled on the network and remediation must take place before access is given to the visitor on that laptop.
3. Which of the following MUST a programmer implement to prevent cross-site scripting?
Validate input to remove hypertext
Add input validation to forms.
CAC
NOOP instructions
4. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?
Fault tolerance
se file servers attached to an NAS system.
Evil twin
Rogue access points
5. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?
Data Encryption Standard (DES)
Privacy policy
SYN attacks
Separation of duties
6. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?
NIDS
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
Confidentiality - Availability
quantitative risk assessment
7. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?
Baseline reporting
Judgment
Mandatory vacation
The user's PC is missing the authentication agent.
8. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in
S/MIME PGP
Having the offsite location of tapes also be the hot siteservers
The server is missing the default gateway.
Asymmetric and Hashing
9. You are performing risk assessment for an organization. What should you do during impact assessment?
Hierarchical list of critical systems
The server is missing the default gateway.
Blind FTP
Determine the potential monetary costs related to a threat
10. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of
Vulnerability scan
Before and after the imaging process and then hash the forensic image
Forward to different RDP listening ports.
SSL
11. Which of the following BEST describes the proper method and reason to implement port security?
Proxies
ARP poisoning
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
AC filtering - Disabled SSID broadcast
12. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
Add input validation to forms.
NIDS
Mantraps
Baseline reporting
13. Which of the following reduces the likelihood of a single point of failure when a server fails?
Evil twin
TCP SYN flood attack
Clustering
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
14. Which of the following is a best practice when securing a switch from physical access?
Tailgating
signing of a user agreement.
Disable unused ports
Forward to different RDP listening ports.
15. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?
Deny all
WPA Enterprise
AES and TKIP
Hierarchical list of critical systems
16. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?
Memory - network processes - and system processesserver. If the computer is powered off
The user's PC is missing the authentication agent.
Polymorphic
Loop protection
17. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?
Buffer overflow
Integrity and Authentication
Evil twin
extremely slow and numerous antivirus alerts
18. Which environmental control is part of TEMPEST compliance?
Black hat
Shielding
IPv6
Principle of least privilege
19. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?
Privacy policy
Provider cloud
Hot and cold aisles
Multi-factor authentication.
20. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were
Risk assessmentproduct Answer: D
User rights
Implicit deny
Privilege escalation
21. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?
Privilege escalation
Gas
Vishing
User rights
22. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?
CAC
Principle of least privilege
Spam filters
VPN concentrator
23. Which of the following port numbers is used for SCP by default?
22
Polymorphic
Organize data based on severity and asset value.
Mandatory vacation
24. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.
extremely slow and numerous antivirus alerts
Spear phishing
Proxies
Software as a Service
25. Which of the following is the BEST choice for encryption on a wireless network?
VLAN
WPA2-PSK
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
The user's PC is missing the authentication agent.
26. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal
IPSec
25
DMZ
Protocol analyzer
27. Which of the following is MOST likely to be the last rule contained on any firewall?
Mandatory vacation
Determine open ports
Forward to different RDP listening ports.
Implicit deny
28. Which of the following is a detective security control?
Implement a change management strategy
Decrease the power levels on the WAP
CCTV
quantitative risk assessment
29. Which of the following should NOT be used with username/password authentication?
Vulnerability scanning
Cognitive passwords
Install a network-based IDS
Clustering
30. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?
SSH
PEAP-TLS
Information disclosure
Separation of duties
31. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?
Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
Symmetric Key
Integrity and Authentication
Fiber optic
32. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?
Platform as a Service
ACLs
Vulnerability scan
Block port 23 on the network firewall.
33. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
MAC address
Hardware RAID 5 - Software RAID 1
DAC
Birthday - Full name
34. Which of the following will provide the HIGHEST level of wireless network security?
Validate input to remove hypertext
WPA2
FTPS
Principle of least privilege
35. Which of the following is NOT an application layer security protocol?
smurf attacks
Trojans
IPSec
The PC has become part of a botnet.
36. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Clean desk policy
Protocol analyzer
Organize data based on severity and asset value.
Vishing
37. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai
Protocol analyzer
Implement a change management strategy
Vishing
Decrease the power levels on the WAP
38. NIDS can also be used to help identify...
smurf attacks
Implicit deny
To ensure that staff understands what data they are handling and processing
User rights
39. Which of the following malware types is an antivirus scanner MOST unlikely to discover?
Data Encryption Standard (DES)
Pharming - Logic bomb
Confidentiality - Availability
IKE
40. Which of the following is specific to a buffer overflow attack?
Integrity
Data Encryption Standard (DES)
Enact a policy banning users from bringing in personal music devices.
Initial vector
41. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?
IDS
Logic Bomb
WPA Enterprise
Data Encryption Standard (DES)
42. Which of the following describes the purpose of chain of custody as applied to forensic image retention?
Apply a security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network.
VPN concentrator
TPM
To provide documentation as to who has handled the evidence
43. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?
The web site's public key.
Cognitive passwords
Check if relaying is denied for unauthorized domains
Load balancer
44. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
VPN concentrator
HSM
ACLs
Pharming - Logic bomb
45. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?
Shielding
Algorithm
Clustering
Configure the IE popup blockers
46. The 802.11i standard specifies support for which encryption algorithms?
Business impact analysis
AES and TKIP
Disable unused services - Update HIPS signatures
AC filtering - Disabled SSID broadcast
47. Which of the following is the default rule found in a corporate firewall's access control list?
Vulnerability scanning
Deny all
EMI shielding
MAC address
48. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?
DMZ
MAC filtering
Only the message data is encrypted
Rootkit
49. Performing routine security audits is a form of which of the following controls?
Business impact analysis
Ensure a proper chain of custody
Validate input to remove hypertext
Detective
50. Which of the following environmental variables reduces the potential for static discharges?
Humidity
Visibility - Accessibility - Neighborhood crime rate
CAC
80 - 443