COMPTIA Security+ Practice Exam (2)

100 Questions  I  By Mastermind1100
Comptia Security+ Practice Exam (2)Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  You are the security administrator at Certkiller .com. All Certkiller users have a token and 4-digit personal identification number (PIN) that are used to access their computer systems. The token performs off-line checking for the correct PIN. To which of the following type of attack is Certkiller vulnerable?
A.
B.
C.
D.
2.  Identify the attack that consists of a PC sending PING packets with destination addresses set to the broadcast address and the source address set to the target PC's IP address?
A.
B.
C.
D.
3.  Which of the following is used to describe an autonomous agent that copies itself into one or more host programs, then propagates when the host is run?
A.
B.
C.
D.
4.  What is an attach in which the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victim's system, in order to flood it with REPLY packets called?
A.
B.
C.
D.
5.  Which of the following type of attack CANNOT be deterred solely through technical means?
A.
B.
C.
D.
6.  What characteristic of TCP/IP (transmission Control Protocol/Internet Protocol) does TCP/IP (transmission Control Protocol/Internet Protocol) session hijacking exploit?
A.
B.
C.
D.
7.  Identify the port that permits a user to login remotely on a computer?
A.
B.
C.
D.
8.  What is an attack whereby two different messages using the same hash function produce a common message digest known as?
A.
B.
C.
D.
9.  Which of the attacks can involve the misdirection of the domain name resolution and Internet traffic?
A.
B.
C.
D.
10.  What should the minimum length of a password be to deter dictionary password cracks?
A.
B.
C.
D.
E.
11.  You are the network administrator at Certkiller .com. You discover that your domain name server is resolving the domain name to the wrong IP (Internet Protocol) address and thus misdirecting Internet traffic. You suspect a malicious attack. Which of the following would you suspect?
A.
B.
C.
D.
12.  What do intruders use most often to gain unauthorized-access to a system?
A.
B.
C.
D.
13.  Which of the following are characteristics of a computer virus?
A.
B.
C.
D.
14.  What are MITRE and CERT?
A.
B.
C.
D.
15.  What is usually the goal of TCP (transmission Control Protocol) session hijacking?
A.
B.
C.
D.
E.
16.  Which of the following attacks attempts to crack passwords
A.
B.
C.
D.
17.  What can be sued for credit card information theft? (Choose TWO)
A.
B.
C.
D.
E.
1 comment
18.  Why does social engineering attacks often succeed?
A.
B.
C.
D.
19.  Malicious port scanning determines the _______.
A.
B.
C.
D.
E.
20.  Which of the following can distribute itself without using a host file?
A.
B.
C.
D.
21.  What is an application that appears to perform a useful function but instead contains some sort of malicious code called?
A.
B.
C.
D.
E.
22.  Which of the following is most common method of accomplishing DDoS (Distributed Denial of Service) attacks?
A.
B.
C.
D.
23.  With regards to the use of Instant Messaging, which of the following type of attack can best be guarded against by user awareness training?
A.
B.
C.
D.
24.  Which of the following occurs when a string of data is sent to a buffer that is larger than the buffer was designed to handle?
A.
B.
C.
D.
E.
25.  Which of the following determines which operating system is installed on a system by analyzing its response to certain network traffic?
A.
B.
C.
D.
E.
26.  What is a program that can infect other programs by modifying them to include a version of it called?
A.
B.
C.
D.
27.  How can you determine whether the workstations on the internal network are functioning as zombies participating in external DDoS attacks?
A.
B.
C.
D.
28.  Which of the following fingerprinting techniques exploits the fact that operating systems differ in the amount of information that is quoted when ICMP (Internet Control Message Protocol) errors are encountered?
A.
B.
C.
D.
E.
29.  Which type of attack is based on the probability of two different messages using the same hash function producing a common message digest?
A.
B.
C.
D.
30.  Which of the following is a DoS exploit that sends more traffic to a node than anticipated?
A.
B.
C.
D.
E.
1 comment
31.  Which programming mechanism should be used to permit administrative access whilst bypassing the usual access control methods?
A.
B.
C.
D.
32.  What should a network administrator's first course of action be on receiving an e-mail alerting him to the presence of a virus on the system if a specific executable file exists?
A.
B.
C.
D.
33.  Which of the following is the best defense against a man in the middle attack?
A.
B.
C.
D.
34.  Which program replicate independently across networks?
A.
B.
C.
D.
35.  You are the security administrator at Certkiller .com. You detect intruders accessing your internal network. The source IP (Internet Protocol) addresses originate from trusted networks. What type of attack are you experiencing?
A.
B.
C.
D.
36.  Which malicious software can be transmitted across computer networks without user intervention?
A.
B.
C.
D.
37.  Which port is used by Kerberos by default?
A.
B.
C.
D.
E.
38.  A server or application that accepts more input than the server or application is expecting is known as:
A.
B.
C.
D.
39.  Which of the following can be deterred against by increasing the keyspace and complexity of a password?
A.
B.
C.
D.
40.  Which of the following is an example of the theft of network passwords without the use of software tools?
A.
B.
C.
D.
41.  What is used to verify the equipment status and modify the configuration or settings of network gadgets?
A.
B.
C.
D.
42.  What type of program will record system keystrokes in a text file and e-mail it to the author, and will also delete system logs every five days or whenever a backup is performed?
A.
B.
C.
D.
43.  Which of the following is an effective method of preventing computer viruses from spreading?
A.
B.
C.
D.
44.  Identify a port scanning tool?
A.
B.
C.
D.
45.  What is used by anti-virus software to detect unknown viruses?
A.
B.
C.
D.
46.  What is a piece of code that appears to do something useful while performing a harmful and unexpected function like stealing passwords called?
A.
B.
C.
D.
47.  Identify the malicious software that can be transmitted across computer networks without needing a client to distribute the software?
A.
B.
C.
D.
48.  Which device should you contemplate on choosing in order to protect an internal network segment from traffic external to the segment?
A.
B.
C.
D.
49.  The system administrator of the company has resigned. When the administrator's user ID is deleted, the system suddenly begins deleting files. What type of malicious code is this?
A.
B.
C.
D.
50.  You implement IDS on the Certkiller .com network. You discover traffic from an internal host IP address accessing internal network resources from the Internet. What is causing this?
A.
B.
C.
D.
51.  Identify the ports utilized by e-mail users? (Choose TWO)
A.
B.
C.
D.
E.
52.  Identify the attack that targets a web server if numerous computers send a lot of FIN packets at the same time with spoofed source IP addresses?
A.
B.
C.
D.
53.  Which of the following best describes TCP/IP (Transmission Control Protocol/Internet Protocol) session hijacking?
A.
B.
C.
D.
54.  Which of the following attacks exploits the session initiation between the Transport Control Program (TCP) client and server in a network?
A.
B.
C.
D.
E.
55.  Identify the malicious code that enters the system via a freely distributed game that is purposely installed and played?
A.
B.
C.
D.
56.  In which of the following does someone use an application to capture and manipulate packets as they are passing through your network?
A.
B.
C.
D.
57.  Which of the following is a security breach that does not usually result in the theft of information or other security loss but the lack of legitimate use of that system?
A.
B.
C.
D.
E.
58.  What is the process of forging an IP (Internet Protocol) address to impersonate another machine called?
A.
B.
C.
D.
59.  What is the most common method of social engineering?
A.
B.
C.
D.
60.  You are the network administrator at Certkiller .com. During a routing site audit of Certkiller 's wireless network, you discover an unauthorized Access Point under the desk of Sales department user. When questioned, she denies any knowledge of it, but informs you that her new boyfriend has been to visit her several times, including taking her to lunch one time. What type of attack have you become a victim of?
A.
B.
C.
D.
E.
61.  Identify common utilization of Internet-exposed network services?
A.
B.
C.
D.
62.  Identify the attack where the purpose is to stop a workstation or service from functioning?
A.
B.
C.
D.
63.  What results in poor programming techniques and lack of code review?
A.
B.
C.
D.
64.  You run Nmap against a server on the Certkiller .com network. You discover more open ports than you anticipated. What should you do?
A.
B.
C.
D.
65.  Which of the following network attacks misuses TCP's (Transmission Control Protocol) three way handshake to overload servers and deny access to legitimate users?
A.
B.
C.
D.
66.  In which of the following would an attacker impersonate a dissatisfied customer of a company and requesting a password change on the customer's account?
A.
B.
C.
D.
67.  Which type of attack can easily break a user's password if the user uses simple and meaningful things such as pet names or birthdays for their passwords?
A.
B.
C.
D.
E.
68.  What is the scenario named where a user receives an e-mail requesting personal data as well as bank account details?
A.
B.
C.
D.
69.  Which of the following type of attacks exploits poor programming techniques and lack of code review?
A.
B.
C.
D.
70.  In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the attacker manipulate?
A.
B.
C.
D.
71.  Which of the following is the most effective defense against a social engineering attack?
A.
B.
C.
D.
72.  What is a piece of malicious code that has no productive purpose but can replicate itself and exist only to damage computer systems or create further vulnerabilities called?
A.
B.
C.
D.
E.
1 comment
73.  Identify the malicious code that does not need human involvement to install itself and to spread?
A.
B.
C.
D.
74.  You are the network administrator at Certkiller .com. During a routing site audit of Certkiller 's wireless network, you discover an unauthorized Access Point under the desk of Sales department user. When questioned, she denies any knowledge of it, but informs you that her new boyfriend has been to visit her several times, including taking her to lunch one time. What type of attack have you become a victim of?
A.
B.
C.
D.
E.
75.  Identify the techniques apart from bribery and forgery that attackers use to socially engineer people? (Choose TWO)
A.
B.
C.
D.
E.
76.  It has come to your attention that numerous e-mails are received from an ex employee. You need to determine whether the e-mails originated internally?
A.
B.
C.
D.
77.  Why is certificate expiration important?
A.
B.
C.
D.
2 comments
78.  It has come to your attention that the telephone account for the employees in your department is extremely high. You check the print out and discover that 4,500 text messages is sent daily to random numbers. What is the best option to stop this excessive text messaging?
A.
B.
C.
D.
79.  Loki, NetCaZ, Masters Paradise and NetBus are examples of what type of attack?
A.
B.
C.
D.
E.
80.  What is a program that appears to be useful but contains hidden code that allows unauthorized individuals to exploit or destroy data is commonly known?
A.
B.
C.
D.
81.  What is happening when a user downloads and installs a new screen saver and the program starts to rename and delete random files?
A.
B.
C.
D.
82.  Which of the following is the major difference between a worm and a Trojan horse?
A.
B.
C.
D.
83.  Which of the following attacks can be mitigated against by implementing the following ingress/egress traffic filtering? * Any packet coming into the network must not have a source address of the internal network. * Any packet coming into the network must have a destination address from the internal network. * Any packet leaving the network must have a source address from the internal network. * Any packet leaving the network must not have a destination address from the internal networks. * Any packet coming into the network or leaving the network must not have a source or destination address of a private address or an address listed in RFC19lS reserved space.
A.
B.
C.
D.
E.
84.  Identify the malicious software that will replicate itself by connecting to other programs on the same host workstation?
A.
B.
C.
D.
85.  Determine the programming method you should use to stop buffer overflow attacks?
A.
B.
C.
D.
86.  How can you monitor the online activities of a user?
A.
B.
C.
D.
87.  What is used in a distributed denial of service (DDOS) attack?
A.
B.
C.
D.
88.  You receive an e-mail to reset the online banking username and password. When you attempt to access the link the URL appearing in the browser does not match the link. What is this known as?
A.
B.
C.
D.
89.  Identify the methods of password guessing that needs the longest attack time?
A.
B.
C.
D.
90.  What would a user's best plan of action be on receiving an e-mail message warning of a virus that may have accidentally been sent in the past, and suggesting that the user to delete a specific file if it appears on the user's computer?
A.
B.
C.
D.
91.  In which of the following attacks does the attacker pretend to be a legitimate user?
A.
B.
C.
D.
E.
92.  You configure a computer to act as a zombie set in order to attack a web server on a specific date. What would this contaminated computer be part of?
A.
B.
C.
D.
93.  Which of the following attacks uses ICMP (Internet Control Message Protocol) and improperly formatted MTUs (Maximum Transmission Unit) to crash a target computer?
A.
B.
C.
D.
E.
94.  Which of the following measures can be used to guard against a social engineering attack?
A.
B.
C.
D.
95.  What type of virus can hides itself by intercepting disk access requests?
A.
B.
C.
D.
96.  Which of the following is a DoS (Denial of Service) attack that exploits TCP's (Transmission Control Protocol) three-way handshake for new connections?
A.
B.
C.
D.
E.
97.  Identify the malicious code that enters a system and stay inactive until a user opens that particular program then starts to delete the contents of attached network drives and removable storage devices?
A.
B.
C.
D.
1 comment
98.  Which of the following is the best defense against man in the middle attacks?
A.
B.
C.
D.
99.  As the security administrator you monitor traces from IDS and detect the subsequent data: Date Time Source IP Destination IP Port Type 10/21 0845 192.168.155.28 10.1.20.1 20 SYN 10/21 0850 192.168.155.28 10.1.20.1 21 SYN 10/21 0900 192.168.155.28 10.1.20.1 23 SYN 10/21 0910 192.168.155.28 10.1.20.1 25 SYN You need to determine what will occur?
A.
B.
C.
D.
100.  Identify the type of attack that CGI scripts are vulnerable to?
A.
B.
C.
D.
Back to top
Quiz Comments (6)
Bad Question below: Comptia Security+ Practice Exam (1) Wrong 11. Which of the following is more of an irritation than a security threat? A. Rootkit B. Adware(your answer) C. Trojan D. Adware(correct answer)
There are three quizes (The ones I've created were SYS101)
This quiz has numerous questions repeating themselves. It doesn't touch upon crypto, certificate/registration authorities, disaster recovery - it's like it only tests for attacks and TCP/IP security issues. Really needs a lot more work done on it to be any kind of valid quiz. It's good reinforcement for just those major concepts but this is not at all indicative of what everything is under Sec+ unless the exam is malfunctioning.
You are correct... no systems admin wants to listen to a user explain a hoax eamil. However, in regards to CompTIA, the answer is clearly "report to your system admin". This is reflected in at least two texts that I have.
First question I received on your quiz: Which of the following is a DoS exploit that sends more traffic to a node than anticipated? A. Ping of death B. Buffer Overflow C. Logic Bomb D. Smurf E. None of the Above I think they're both could be correct (especially considering PoD is generally a buffer overflow attack). The only reason I think PoD is the best answer, is because PoD is typically considered a DoS attack ONLY, whereas buffer overflow attacks can have far deeper consequences. http://en.wikipedia.org/wiki/Ping_of_death
I'm Interested in knowing why the quiz was rated low. The question poised are actual question you would be asked in the security + Test. If you find any question questionable or incorrect Feel free to leave a comment and I'll fix or provide that actual references that prove the answer correct
to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz