Comptia Security+ Practice Exam (2)

100 Questions  I  By Mastermind1100 on April 25, 2009
Comptia Security+ Practice Exam (2)Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.

  

Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Identify a port scanning tool?
A.
B.
C.
D.
2.  Which of the following can be deterred against by increasing the keyspace and complexity of a password?
A.
B.
C.
D.
3.  You are the network administrator at Certkiller .com. You discover that your domain name server is resolving the domain name to the wrong IP (Internet Protocol) address and thus misdirecting Internet traffic. You suspect a malicious attack. Which of the following would you suspect?
A.
B.
C.
D.
4.  You are the network administrator at Certkiller .com. During a routing site audit of Certkiller 's wireless network, you discover an unauthorized Access Point under the desk of Sales department user. When questioned, she denies any knowledge of it, but informs you that her new boyfriend has been to visit her several times, including taking her to lunch one time. What type of attack have you become a victim of?
A.
B.
C.
D.
E.
5.  Identify the malicious code that enters the system via a freely distributed game that is purposely installed and played?
A.
B.
C.
D.
6.  Which of the following is used to describe an autonomous agent that copies itself into one or more host programs, then propagates when the host is run?
A.
B.
C.
D.
7.  A server or application that accepts more input than the server or application is expecting is known as:
A.
B.
C.
D.
8.  Which of the following type of attack CANNOT be deterred solely through technical means?
A.
B.
C.
D.
9.  You configure a computer to act as a zombie set in order to attack a web server on a specific date. What would this contaminated computer be part of?
A.
B.
C.
D.
10.  It has come to your attention that numerous e-mails are received from an ex employee. You need to determine whether the e-mails originated internally?
A.
B.
C.
D.
11.  You are the network administrator at Certkiller .com. During a routing site audit of Certkiller 's wireless network, you discover an unauthorized Access Point under the desk of Sales department user. When questioned, she denies any knowledge of it, but informs you that her new boyfriend has been to visit her several times, including taking her to lunch one time. What type of attack have you become a victim of?
A.
B.
C.
D.
E.
12.  Which of the following attacks attempts to crack passwords
A.
B.
C.
D.
13.  You implement IDS on the Certkiller .com network. You discover traffic from an internal host IP address accessing internal network resources from the Internet. What is causing this?
A.
B.
C.
D.
14.  Which of the following can distribute itself without using a host file?
A.
B.
C.
D.
15.  Identify the attack that targets a web server if numerous computers send a lot of FIN packets at the same time with spoofed source IP addresses?
A.
B.
C.
D.
16.  Which of the following is an effective method of preventing computer viruses from spreading?
A.
B.
C.
D.
17.  Which of the following is the best defense against man in the middle attacks?
A.
B.
C.
D.
18.  Why does social engineering attacks often succeed?
A.
B.
C.
D.
19.  Which of the following fingerprinting techniques exploits the fact that operating systems differ in the amount of information that is quoted when ICMP (Internet Control Message Protocol) errors are encountered?
A.
B.
C.
D.
E.
20.  Identify the malicious software that can be transmitted across computer networks without needing a client to distribute the software?
A.
B.
C.
D.
21.  Which type of attack is based on the probability of two different messages using the same hash function producing a common message digest?
A.
B.
C.
D.
22.  Which program replicate independently across networks?
A.
B.
C.
D.
23.  What is the process of forging an IP (Internet Protocol) address to impersonate another machine called?
A.
B.
C.
D.
24.  As the security administrator you monitor traces from IDS and detect the subsequent data: Date Time Source IP Destination IP Port Type 10/21 0845 192.168.155.28 10.1.20.1 20 SYN 10/21 0850 192.168.155.28 10.1.20.1 21 SYN 10/21 0900 192.168.155.28 10.1.20.1 23 SYN 10/21 0910 192.168.155.28 10.1.20.1 25 SYN You need to determine what will occur?
A.
B.
C.
D.
25.  What is used in a distributed denial of service (DDOS) attack?
A.
B.
C.
D.
26.  What results in poor programming techniques and lack of code review?
A.
B.
C.
D.
27.  What is the most common method of social engineering?
A.
B.
C.
D.
28.  How can you monitor the online activities of a user?
A.
B.
C.
D.
29.  Identify the attack that consists of a PC sending PING packets with destination addresses set to the broadcast address and the source address set to the target PC's IP address?
A.
B.
C.
D.
30.  Which of the following determines which operating system is installed on a system by analyzing its response to certain network traffic?
A.
B.
C.
D.
E.
31.  Identify the malicious code that does not need human involvement to install itself and to spread?
A.
B.
C.
D.
32.  What is a program that can infect other programs by modifying them to include a version of it called?
A.
B.
C.
D.
33.  Why is certificate expiration important?
A.
B.
C.
D.
1 comment
34.  Which of the attacks can involve the misdirection of the domain name resolution and Internet traffic?
A.
B.
C.
D.
35.  Which of the following is most common method of accomplishing DDoS (Distributed Denial of Service) attacks?
A.
B.
C.
D.
36.  What type of virus can hides itself by intercepting disk access requests?
A.
B.
C.
D.
37.  Which malicious software can be transmitted across computer networks without user intervention?
A.
B.
C.
D.
38.  What is an attack whereby two different messages using the same hash function produce a common message digest known as?
A.
B.
C.
D.
39.  Which of the following occurs when a string of data is sent to a buffer that is larger than the buffer was designed to handle?
A.
B.
C.
D.
E.
40.  You are the security administrator at Certkiller .com. All Certkiller users have a token and 4-digit personal identification number (PIN) that are used to access their computer systems. The token performs off-line checking for the correct PIN. To which of the following type of attack is Certkiller vulnerable?
A.
B.
C.
D.
41.  Which of the following type of attacks exploits poor programming techniques and lack of code review?
A.
B.
C.
D.
42.  Which programming mechanism should be used to permit administrative access whilst bypassing the usual access control methods?
A.
B.
C.
D.
43.  Identify common utilization of Internet-exposed network services?
A.
B.
C.
D.
44.  What should the minimum length of a password be to deter dictionary password cracks?
A.
B.
C.
D.
E.
45.  Which of the following is a security breach that does not usually result in the theft of information or other security loss but the lack of legitimate use of that system?
A.
B.
C.
D.
E.
46.  Determine the programming method you should use to stop buffer overflow attacks?
A.
B.
C.
D.
47.  What should a network administrator's first course of action be on receiving an e-mail alerting him to the presence of a virus on the system if a specific executable file exists?
A.
B.
C.
D.
48.  You run Nmap against a server on the Certkiller .com network. You discover more open ports than you anticipated. What should you do?
A.
B.
C.
D.
49.  Which of the following attacks exploits the session initiation between the Transport Control Program (TCP) client and server in a network?
A.
B.
C.
D.
E.
50.  What is the scenario named where a user receives an e-mail requesting personal data as well as bank account details?
A.
B.
C.
D.
51.  What is an application that appears to perform a useful function but instead contains some sort of malicious code called?
A.
B.
C.
D.
E.
52.  You are the security administrator at Certkiller .com. You detect intruders accessing your internal network. The source IP (Internet Protocol) addresses originate from trusted networks. What type of attack are you experiencing?
A.
B.
C.
D.
53.  In which of the following would an attacker impersonate a dissatisfied customer of a company and requesting a password change on the customer's account?
A.
B.
C.
D.
54.  Which of the following is the best defense against a man in the middle attack?
A.
B.
C.
D.
55.  What type of program will record system keystrokes in a text file and e-mail it to the author, and will also delete system logs every five days or whenever a backup is performed?
A.
B.
C.
D.
56.  Which of the following is a DoS (Denial of Service) attack that exploits TCP's (Transmission Control Protocol) three-way handshake for new connections?
A.
B.
C.
D.
E.
57.  Identify the malicious software that will replicate itself by connecting to other programs on the same host workstation?
A.
B.
C.
D.
58.  How can you determine whether the workstations on the internal network are functioning as zombies participating in external DDoS attacks?
A.
B.
C.
D.
59.  Which of the following is the major difference between a worm and a Trojan horse?
A.
B.
C.
D.
60.  With regards to the use of Instant Messaging, which of the following type of attack can best be guarded against by user awareness training?
A.
B.
C.
D.
61.  Identify the port that permits a user to login remotely on a computer?
A.
B.
C.
D.
62.  Malicious port scanning determines the _______.
A.
B.
C.
D.
E.
63.  Identify the type of attack that CGI scripts are vulnerable to?
A.
B.
C.
D.
64.  What is happening when a user downloads and installs a new screen saver and the program starts to rename and delete random files?
A.
B.
C.
D.
65.  In which of the following attacks does the attacker pretend to be a legitimate user?
A.
B.
C.
D.
E.
66.  Identify the ports utilized by e-mail users? (Choose TWO)
A.
B.
C.
D.
E.
67.  What is a piece of code that appears to do something useful while performing a harmful and unexpected function like stealing passwords called?
A.
B.
C.
D.
68.  Which type of attack can easily break a user's password if the user uses simple and meaningful things such as pet names or birthdays for their passwords?
A.
B.
C.
D.
E.
69.  Which device should you contemplate on choosing in order to protect an internal network segment from traffic external to the segment?
A.
B.
C.
D.
70.  Identify the techniques apart from bribery and forgery that attackers use to socially engineer people? (Choose TWO)
A.
B.
C.
D.
E.
71.  What would a user's best plan of action be on receiving an e-mail message warning of a virus that may have accidentally been sent in the past, and suggesting that the user to delete a specific file if it appears on the user's computer?
A.
B.
C.
D.
72.  Which of the following is a DoS exploit that sends more traffic to a node than anticipated?
A.
B.
C.
D.
E.
73.  Which port is used by Kerberos by default?
A.
B.
C.
D.
E.
74.  Identify the methods of password guessing that needs the longest attack time?
A.
B.
C.
D.
75.  What characteristic of TCP/IP (transmission Control Protocol/Internet Protocol) does TCP/IP (transmission Control Protocol/Internet Protocol) session hijacking exploit?
A.
B.
C.
D.
76.  In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the attacker manipulate?
A.
B.
C.
D.
77.  Which of the following is the most effective defense against a social engineering attack?
A.
B.
C.
D.
78.  What is a program that appears to be useful but contains hidden code that allows unauthorized individuals to exploit or destroy data is commonly known?
A.
B.
C.
D.
79.  You receive an e-mail to reset the online banking username and password. When you attempt to access the link the URL appearing in the browser does not match the link. What is this known as?
A.
B.
C.
D.
80.  Identify the malicious code that enters a system and stay inactive until a user opens that particular program then starts to delete the contents of attached network drives and removable storage devices?
A.
B.
C.
D.
81.  Which of the following network attacks misuses TCP's (Transmission Control Protocol) three way handshake to overload servers and deny access to legitimate users?
A.
B.
C.
D.
82.  What do intruders use most often to gain unauthorized-access to a system?
A.
B.
C.
D.
83.  In which of the following does someone use an application to capture and manipulate packets as they are passing through your network?
A.
B.
C.
D.
84.  What is a piece of malicious code that has no productive purpose but can replicate itself and exist only to damage computer systems or create further vulnerabilities called?
A.
B.
C.
D.
E.
85.  Loki, NetCaZ, Masters Paradise and NetBus are examples of what type of attack?
A.
B.
C.
D.
E.
86.  Which of the following best describes TCP/IP (Transmission Control Protocol/Internet Protocol) session hijacking?
A.
B.
C.
D.
87.  Which of the following are characteristics of a computer virus?
A.
B.
C.
D.
88.  It has come to your attention that the telephone account for the employees in your department is extremely high. You check the print out and discover that 4,500 text messages is sent daily to random numbers. What is the best option to stop this excessive text messaging?
A.
B.
C.
D.
89.  What is usually the goal of TCP (transmission Control Protocol) session hijacking?
A.
B.
C.
D.
E.
90.  What are MITRE and CERT?
A.
B.
C.
D.
91.  Which of the following is an example of the theft of network passwords without the use of software tools?
A.
B.
C.
D.
92.  What is used to verify the equipment status and modify the configuration or settings of network gadgets?
A.
B.
C.
D.
93.  Which of the following measures can be used to guard against a social engineering attack?
A.
B.
C.
D.
94.  Which of the following attacks uses ICMP (Internet Control Message Protocol) and improperly formatted MTUs (Maximum Transmission Unit) to crash a target computer?
A.
B.
C.
D.
E.
95.  What is an attach in which the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victim's system, in order to flood it with REPLY packets called?
A.
B.
C.
D.
96.  Identify the attack where the purpose is to stop a workstation or service from functioning?
A.
B.
C.
D.
97.  Which of the following attacks can be mitigated against by implementing the following ingress/egress traffic filtering? * Any packet coming into the network must not have a source address of the internal network. * Any packet coming into the network must have a destination address from the internal network. * Any packet leaving the network must have a source address from the internal network. * Any packet leaving the network must not have a destination address from the internal networks. * Any packet coming into the network or leaving the network must not have a source or destination address of a private address or an address listed in RFC19lS reserved space.
A.
B.
C.
D.
E.