CompTIA Security+ Part 4

55 Questions | Total Attempts: 306

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Comptia securit+ exam


Questions and Answers
  • 1. 
    Which of the following is LEAST effective when hardening an operating system?
    • A. 

      Configuration baselines

    • B. 

      Limiting administrative privileges

    • C. 

      Installing HIDS

    • D. 

      Install a software firewall

  • 2. 
    Which of the following provides the MOST control when deploying patches?
    • A. 

      Hotfix

    • B. 

      Remote desktop

    • C. 

      Patch management

    • D. 

      Service packs

  • 3. 
    If a technician wants to know when a computer application is accessing the network, which of the following logs should be reviewed?
    • A. 

      Antivirus log

    • B. 

      RADIUS log

    • C. 

      Performance log

    • D. 

      Host firewall log

  • 4. 
    All of the following are components of IPSec EXCEPT:
    • A. 

      Encapsulating security payload

    • B. 

      Internet key exchange

    • C. 

      Temporal key interchange protocol

    • D. 

      Authentication Header (AH)

  • 5. 
    IPSec connection parameters are stored in which of the following?
    • A. 

      Security association database

    • B. 

      Security payload index

    • C. 

      Security parameter index

    • D. 

      Certificate Authority (CA)

  • 6. 
    Which of the following will provide a 128-bit hash?
    • A. 

      MD5

    • B. 

      AES128

    • C. 

      ROT13

    • D. 

      SHA-1

  • 7. 
    Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?
    • A. 

      Collision avoidance

    • B. 

      Collision resistance

    • C. 

      Collision strength

    • D. 

      Collision metric

  • 8. 
    Which of the following should be included in a forensic toolkit?
    • A. 

      Compressed air

    • B. 

      Tape recorder

    • C. 

      Fingerprint cards

    • D. 

      Digital camera

  • 9. 
    Which of the following BEST describes the form used while transferring evidence?
    • A. 

      Booking slip

    • B. 

      Affidavit

    • C. 

      Chain of custody

    • D. 

      Evidence log

  • 10. 
    Which of the following is the primary incident response function of a first responder?
    • A. 

      To evaluate the scene and repair the problem

    • B. 

      To secure the scene and preserve evidence

    • C. 

      To evaluate the scene and determine the cause

    • D. 

      To gather evidence and write reports

  • 11. 
    Which of the following is the GREATEST problem with low humidity in a server room?
    • A. 

      Static electricity

    • B. 

      Power surge

    • C. 

      Electromagnetic interference

    • D. 

      Brown out

  • 12. 
    Which of the following protocols is used to unsure secure transmissions on port 443?
    • A. 

      HTTPS

    • B. 

      Telnet

    • C. 

      SFTP

    • D. 

      SHTTP

  • 13. 
    When should a technician perform disaster recovery testing?
    • A. 

      Immediately following lessons learned sessions

    • B. 

      Once a month, during peak business hours

    • C. 

      After the network is stable and online

    • D. 

      In accordance with the disaster recovery plan

  • 14. 
    Which of the following is the BEST backup method to restore the entire operating system and all related software?
    • A. 

      Weekly

    • B. 

      Incremental

    • C. 

      Disk Image

    • D. 

      Differential

  • 15. 
    How many keys are utilized in symmetric cryptography?
    • A. 

      One

    • B. 

      Two

    • C. 

      Three

    • D. 

      Four

  • 16. 
    Which of the following terms is BEST associated with public key infrastructure (PKI)?
    • A. 

      MD5 hashing

    • B. 

      Symmetric key

    • C. 

      Symmetric algorithm

    • D. 

      Digital signatures

  • 17. 
    Which of the following is the LAST step to granting access to specific domain resources?
    • A. 

      Validate the user

    • B. 

      Authorize the user

    • C. 

      Verify the user

    • D. 

      Authenticate the user

  • 18. 
    After an attacker has successfully gained remote access to a server with minimal privileges, which of the following is their next step?
    • A. 

      Elevate system privileges

    • B. 

      Monitor network traffic

    • C. 

      Capture private keys

    • D. 

      Begin key recovery

  • 19. 
    Which of the following should the technician recommend as a way to logically separate various internal networks from each other?
    • A. 

      NIDS

    • B. 

      VLAN

    • C. 

      NAT

    • D. 

      HIDS

  • 20. 
    An organization has requested the ability to monitor all network traffic as it traverses their network.  Which of the following should a technician implement?
    • A. 

      Content filter

    • B. 

      Protocol analyzer

    • C. 

      Honeypot

    • D. 

      HIDS

  • 21. 
    A large amount of viruses have been found on numerous domain workstations.  Which of the following should the technician implement?
    • A. 

      Decentralized antivirus

    • B. 

      Host based intrusion detection

    • C. 

      Centralized antivirus

    • D. 

      Spyware detection

  • 22. 
    Which of the following is the MOST difficult security concern to detect when contractors enter a secured facility?
    • A. 

      Rogue access points being installed

    • B. 

      Copying sensitive information with cellular phones

    • C. 

      Removing mass storage iSCSI drives

    • D. 

      Removing network attached storage

  • 23. 
    When are port scanners generally used on systems?
    • A. 

      At the middle of a vulnerability assessment

    • B. 

      At the beginning of a vulnerability assessment

    • C. 

      When there is a need to document vulnerabilities

    • D. 

      At the end of a penetration test assessment

  • 24. 
    The staff must be cross-trained in different functional areas so that fraud can be detected.  Which of the following is this an example of?
    • A. 

      Separation of duties

    • B. 

      Implicit deny

    • C. 

      Least privilege

    • D. 

      Job rotation

  • 25. 
    Human Resources has requested that staff members be moved to different parts of the country into new positions.  Which of the following is this an example of?
    • A. 

      Implicit deny

    • B. 

      Separation of duties

    • C. 

      Least privilege

    • D. 

      Job rotation

Back to Top Back to top