Security + Test

Security Plus Test

This is an Security+ preparation test for those interested in checking how good their knowledge is in Computer Security and other aspects tested by COMPTIA for those who want to become IT Specialists and Technicians. The test contains multiple choice questions. It should take you less than 30 min to finish the exam. This test should be taken only for fun, the score that will be shown later doesn't necessarily show your real level. Have fun!

Security Plus Test

  1. Which of the following is specifically designed as a decoy to attract hacker activity?
  2. | NIDS | Firewall | Honey pot | HIDS |

  3. These provide confidentiality protection as part of the underlying protocol EXCEPT:
  4. | IPSec | L2TP | SSH | SSL |

  5. What does asymmetric key cryptography provide MOST?
  6. | A pre-shared key | Confidentiality | Kiting | Performance |

  7. One of the following is NOT a symmetric key algorithm:
  8. | RSA | 3DES | RC4 | Rijndael |

  9. Most Antivirus software detect malware by comparing the characteristics of known instances against Which one of these?
  10. | File size | NIDS signature | Signature | Text |

  11. Which fire suppression tools would cause the MOST damage to electrical equipment?
  12. | Carbon Dioxide | Foam | Halon | Water |

  13. You need to make changes to existing files and folders as well as create new files and folders within a specific folder. What kind of access control list (ACL) permission should you be granted while following least privilege practices?
  14. | Modify | Read | Read & Execute | Write |

  15. Which of the following is responsible for defining protocols that control access to network resources?
  16. | DMZ | NAC | NAT | VLAN |

  17. The process of removing PII data from a disk drive before reuse is called:
  18. | Degaussing | Wiping | Reformatting | Sanitization |

  19. Using permissions from another user’s account to access a system or an application is a form of:
  20. | ARP spoofing | War diving | Phishing | Privilege escalation |

  21. A software bundle containing multiple security fixes is called:
  22. | Hotfix | Patch | Patch management | Service pack |

  23. A duplicate of the original site of the organization, with full computer systems as well as complete backups is called:
  24. | Cold site | Freezing site | Hot site | Warm site |

  25. Which one of these allows for notification when a hacking attempt is discovered?
  26. | NAT | Port mapper | NIDS | Protocol analyzer |

  27. Which one of these allows for proof that a certain person sent a particular email?
  28. | Authenticity | Confidentiality | Integrity | Non-repudiation |

  29. Which one of these would use a group of bots to stop a web server from accepting new requests?
  30. | ARP | DDoS | DoS | MAC |

  31. Which one of these uses a sandbox to manage a program’s ability to access system resources?
  32. | ActiveX | Cold Fusion | Java | JavaScript |

  33. Which one of these physical threats can be prevented with mantraps?
  34. | Dumpster diving | Piggybacking | Shoulder surfing | Social engineering |

  35. Which one of these is a problem MOST associated with UTP cable?
  36. | Crosstalk | Fuzzing | Refraction | Vampire tap |

  37. Which one of these allows for a secure connection to be established through a web browser?
  38. | HTTP | L2TP | SSH | SSL |

  39. Which one of these exploits can only be triggered by a specific date or time key?
  40. | Botnet | Logic bomb | Trojan | Worm |

  41. When you log in with a smart card, which one of these keys are you using?
  42. | Cipher Key | Private Key | Public Key | Shared Key |

  43. How many keys are used in symmetric cryptography?
  44. | 1 | 2 | 3 | 4 |

  45. Which one of these is a way to logically separate various internal networks from each other?
  46. | HIDS | NAT | NIDS | VLAN |

  47. Which one of these is an example of detecting employees’ fraud?
  48. Implicit deny
    Job rotation
    Least privilege
    Separation of duties

  49. Penetration testing should only be used once one of these items is in place:
  50. Acceptable use policy
    Disclosure policy
    Service level agreement
    Written permission

  51. Validating the users claimed identity is called:
  52. | Authentication | Identification | Validation | Verification |

  53. Which one of these techniques is used to send unsolicited messages over Bluetooth to Bluetooth-enabled devices?
  54. | Bluesnarfing | War diving | War dialing | Bluejacking |

  55. Which one of these would be MOST effective in stopping phishing attempts?
  56. | Antivirus | DMZ | NIDS | User education |

  57. Which one of these could be used to capture website GET requests?
  58. Network mapper
    Port scanner
    Protocol analyzer
    Vulnerability scanner

  59. Many of the workstations on the network are flooding the servers. What’s the likely cause?
  60. | Logic bomb | Spam | Virus | Worm |

  61. Which one of these is a reason to use a Faraday cage?
  62. Repeat weak signals
    Find rogue access points
    Amplify weak signals
    Mitigate data emanation

  63. What should be implemented to mitigate the chances of a successful attack against the wireless network?
  64. Implement a biometric system and WEP
    Implement an authentication system and WEP
    Implement an authentication system and WPA
    Implement an identification system and WPA2

  65. Which one of these programming measures should be used to prevent buffer overflow attacks?
  66. Anti-spyware
    Input validation
    Nested loops
    Signed applets

  67. Which type of backup does not clear the archive bit?
  68. | Differential | Full | Incremental | Normal |

  69. Which one of these can be used to build a map of a system's open ports and operating system versions?
  70. Drive mapping
    Network mappers
    Password cracker
    Port scanner

  71. Which of the following can be used to restrict access to files based on the identity of the user or group and security classification of the information?
  72. | DAC | MAC | NTFS | RBAC |

  73. Which of the following sends a a large number of TCP synchronization requests to a host?
  74. | Smurfing | Spoofing | SYN flood | Teardrop |

  75. Which of the following command-line tool may be used for patch management?
  76. | ChkDsk | HFNetChk | Netdiag | RegView |

  77. An antivirus server keeps flagging an approved application as a threat. This is an example of:
  78. False negative
    False positive
    True negative
    True positive

  79. Which of the following is a tool that enables you to centrally conduct audits on system security setting?
  80. Microsoft Management Console
    Nessus
    Network diagnostic tool
    Reliability and Performance Monitor

  81. Which of these allows someone to secretly embed hidden files by using the least significant bit(s)?
  82. | Steganography | Trojan horse | Virus | Worm |

  83. Which of these allows an attacker to capture HTTP requests and send back a spoofed page?
  84. | Phishing | Replay | TCP/IP hijacking | Teardrop |

  85. The following are steps in the incident response process EXCEPT:
  86. | Containment | Eradication | Recovery | Authentication |

  87. Which of these NIDS configurations is solely based on specific network traffic?
  88. Anomaly-based
    Behavior-based
    Host-based
    Signature-based




Please visit our StudyMaster website for more free study guides.

Copyright © 2016 STUDYMASTER.ORG. All rights reserved.