Comptia Security+ Practice Exam (2) Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.
Kerberos makes use of port 139
Kerberos makes use of port 443
Kerberos makes use of port 23
Kerberos makes use of port 88
None of the Above
Your first step should be to close all the ports and to monitor it to see if a process tries to reopen the port.
Your first step should be to examine the process using the ports.
Your first step should be to leave the ports open and to monitor the traffic for malicious activity.
Your first step should be to run Nmap again and to monitor it to see if different results are obtained.
Port 3389
Port 8080
Port 143
Port 23
You should identify port 143
You should identify port 3389
You should identify port 110
You should identify port 334
You should identify port 23
Brute Force attack
Spoofing attack
Buffer overflow
Man in the middle attack
SYN flood
Birthday Attack
SYN Attack
Buffer Overflow
Smurf
None of the Above
Man in the middle attack
Smurf attack
Ping of death attack
TCP SYN (Transmission Control Protocol / Synchronized) attack
None of the Above
OS (Operating System) scanning
Reverse engineering.
Fingerprinting
Host hijacking.
None of the Above
Computer name
Fingerprint of the operating system
Physical cabling topology of a network
User ID and passwords
All of the Above
TCP (Transmission Control Protocol) options.
ICMP (Internet Control Message Protocol) error message quenching.
Fragmentation handling.
ICMP (Internet Control Message Protocol) message quoting
None of the Above
CGI (Common Gateway Interface) script
Birthday
Buffer overflow
Dictionary
Man in the middle.
Smurf
Teardrop
SYN (Synchronize)
Internal host computers simultaneously failing.
Overwhelming and shutting down multiple services on a server.
Multiple servers or routers monopolizing and over whelming the bandwidth of a particular server or router.
An individual e-mail address list being used to distribute a virus.
SYN (Synchronize) flood.
Ping of death attack.
Land attack.
Buffer overflow attack.
None of the Above
Ping of death
Buffer Overflow
Logic Bomb
Smurf
None of the Above
CRL
DoS
ACL
MD2
None of the above
Brute force
Spoofing
Man in the middle
Back door
None of the Above
Taking over a legitimate TCP (transmission Control Protocol) connection.
Predicting the TCP (transmission Control Protocol) sequence number.
Identifying the TCP (transmission Control Protocol) port for future exploitation.
Identifying source addresses for malicious use.
None of the Above
The TCP/IP (Transmission Control Protocol/Internet Protocol) session state is altered in a way that intercepts legitimate packets and allows a third party host to insert acceptable packets.
The TCP/IP (Transmission Control Protocol/Internet Protocol) session state is altered allowing third party hosts to create new IP (Internet Protocol) addresses.
The TCP/IP (Transmission Control Protocol/Internet Protocol) session state remains unaltered allowing third party hosts to insert packets acting as the server.
The TCP/IP (Transmission Control Protocol/Internet Protocol) session state remains unaltered allowing third party hosts to insert packets acting as the client.
The fact that TCP/IP (transmission Control Protocol/Internet Protocol) has no authentication mechanism, thus allowing a clear text password of 16 bytes
The fact that TCP/IP (transmission Control Protocol/Internet Protocol) allows a packet to be spoofed and inserted into a stream, thereby enabling commands to be executed on the remote host
The fact that TCP/IP (transmission Control Protocol/Internet Protocol) has no authentication mechanism, and therefore allows connectionless packets from anyone
The fact that TCP/IP (transmission Control Protocol/Internet Protocol) allows packets to be tunneled to an alternate network
SYN (Synchronize) flooding
Spoofing
DoS (Denial of Service) attacks
Dictionary attacks
None of the Above
Aliasing
Spoofing
Flooding
Redirecting
None of the Above
DoS (Denial of Service)
Spoofing
Brute force attack
Reverse DNS (Domain Name Service)
The version field.
The source address field.
The source port field.
The destination address field.
Reverse DNS (Domain Name Service)
Brute force attack
Spoofing
DoS (Denial of Service)
Wait!
Here's an interesting quiz for you.