CompTIA Security+ (Sy0-201)

184 Questions | Attempts: 487
Share

SettingsSettingsSettings
Security Plus Quizzes & Trivia

CompTIA Security+ (SY0-201) Practice Exam
Keep coming back as more questions are added daily. Goal is a test with over 700 randomly selected questions so each attempt has a different set of 50 questions per attempt.
177 of 730 loaded..//22Sept2010
Disclaimer: I have been told from those that have gone to take the actual test that these questions are dissimilar. However, the basic disciplines are covered and should help considerably to pick out key associations between questions and answers.


Questions and Answers
  • 1. 

    All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:

    • A.

      SSL

    • B.

      SSH

    • C.

      L2TP

    • D.

      IPSec

    Correct Answer
    C. L2TP
  • 2. 

    Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?

    • A.

      Steganography

    • B.

      Worm

    • C.

      Trojan horse

    • D.

      Virus

    Correct Answer
    A. Steganography
  • 3. 

    Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?

    • A.

      Teardrop

    • B.

      TCP/IP hijacking

    • C.

      Phishing

    • D.

      Replay

    Correct Answer
    B. TCP/IP hijacking
  • 4. 

    How should a company test the integrity of its backup data?

    • A.

      By conducting another backup 

    • B.

      By using software to recover deleted files

    • C.

      By restoring part of the backup

    • D.

      By reviewing the written procedures

    Correct Answer
    C. By restoring part of the backup
  • 5. 

    How should a company test the integrity of its backup data?

    • A.

      By conducting another backup

    • B.

      By using software to recover deleted files

    • C.

      By restoring part of the backup

    • D.

      By reviewing the written procedures

    Correct Answer
    C. By restoring part of the backup
  • 6. 

    Which of following can BEST be used to determine the topology of a network and discover unknown devices?

    • A.

      Vulnerability scanner

    • B.

      NIPS

    • C.

      Protocol analyzer

    • D.

      Network mapper

    Correct Answer
    D. Network mapper
  • 7. 

    When should a technician perform penetration testing?

    • A.

      When the technician suspects that weak passwords exist on the network

    • B.

      When the technician is trying to guess passwords on a network

    • C.

      When the technician has permission from the owner of the network

    • D.

      When the technician is war driving and trying to gain access

    Correct Answer
    C. When the technician has permission from the owner of the network
  • 8. 

    An administrator has implemented a new SMTP service on a server. A public IP address translates to the internal SMTP server. The administrator notices many sessions to the server, and gets notification that the servers public IP address is now reported in a spam real-time block list.Which of the following is wrong with the server?

    • A.

      SMTP open relaying is enabled

    • B.

      It does not have a spam filter

    • C.

      The amount of sessions needs to be limited

    • D.

      The public IP address is incorrect

    Correct Answer
    A. SMTP open relaying is enabled
  • 9. 

    Which of the following is MOST efficient for encrypting large amounts of data?

    • A.

      Hashing algorithms

    • B.

      Symmetric key algorithms

    • C.

      Asymmetric key algorithms

    • D.

      ECC algorithms

    Correct Answer
    B. Symmetric key algorithms
  • 10. 

    Which of the following is a reason why a company should disable the SSID broadcast of the wireless access points?

    • A.

      Rogue access points

    • B.

      War driving

    • C.

      Weak encryption

    • D.

      Session hijacking

    Correct Answer
    B. War driving
  • 11. 

    Which of the following BEST describes ARP?

    • A.

      Discovering the IP address of a device from the MAC address

    • B.

      Discovering the IP address of a device from the DNS name

    • C.

      Discovering the MAC address of a device from the IP address

    • D.

      Discovering the DNS name of a device from the IP address

    Correct Answer
    C. Discovering the MAC address of a device from the IP address
  • 12. 

    Which of the following would be BEST to use to apply corporate security settings to a device?

    • A.

      A security patch

    • B.

      A security hotfix

    • C.

      An OS service pack

    • D.

      A security template

    Correct Answer
    D. A security template
  • 13. 

    A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protecteD. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If the anti-malware software is purchased, which of the following is the expected net savings?

    • A.

      $900

    • B.

      $2,290

    • C.

      $2,700

    • D.

      $5,000

    Correct Answer
    B. $2,290
  • 14. 

    Which of the following is the main objective of steganography?

    • A.

      Message digest

    • B.

      Encrypt information

    • C.

      Hide information

    • D.

      Data integrity

    Correct Answer
    C. Hide information
  • 15. 

    Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key?

    • A.

      3DES

    • B.

      AES

    • C.

      DH-ECC

    • D.

      MD5

    Correct Answer
    C. DH-ECC
  • 16. 

    Which of the following improves security in a wireless system?

    • A.

      IP spoofing

    • B.

      MAC filtering

    • C.

      SSID spoofing

    • D.

      Closed network

    Correct Answer
    B. MAC filtering
  • 17. 

    A user wants to implement secure LDAP on the network. Which of the following port numbers secure LDAP use by default?

    • A.

      53

    • B.

      389

    • C.

      443

    • D.

      636

    Correct Answer
    D. 636
  • 18. 

    On which of the following is a security technician MOST likely to find usernames?

    • A.

      DNS logs

    • B.

      Application logs

    • C.

      Firewall logs

    • D.

      DHCP logs

    Correct Answer
    B. Application logs
  • 19. 

    How many keys are utilized with asymmetric cryptography?

    • A.

      One

    • B.

      Two

    • C.

      Five

    • D.

      Seven

    Correct Answer
    B. Two
  • 20. 

    During a risk assessment it is discovered that only one system administrator is assigned several tasks  critical to continuity of operations. It is recommended to cross train other system administrators to perform these tasks and mitigate which of the following risks?

    • A.

      DDoS

    • B.

      Privilege escalation

    • C.

      Disclosure of PII

    • D.

      Single point of failure

    Correct Answer
    D. Single point of failure
  • 21. 

    Which of the following network filtering devices will rely on signature updates to be effective?

    • A.

      Proxy server9

    • B.

      Firewall

    • C.

      NIDS

    • D.

      Honeynet

    Correct Answer
    C. NIDS
  • 22. 

    Which of the following is a single server that is setup in the DMZ or outer perimeter in order to distract attackers?

    • A.

      Honeynet

    • B.

      DMZ

    • C.

      Honeypot

    • D.

      VLAN

    Correct Answer
    C. Honeypot
  • 23. 

    Which of the following encryption algorithms is decrypted in the LEAST amount of time?

    • A.

      RSA

    • B.

      AES

    • C.

      3DES

    • D.

      L2TP

    Correct Answer
    B. AES
  • 24. 

    An administrator is trying to secure a network from threats originating outside the network. Which of the following devices provides protection for the DMZ from attacks launched from the Internet?

    • A.

      Antivirus

    • B.

      Content filter

    • C.

      Firewall

    • D.

      Proxy server

    Correct Answer
    C. Firewall
  • 25. 

    Which of the following is a way to manage operating system updates?

    • A.

      Service pack management

    • B.

      Patch application

    • C.

      Hotfix management

    • D.

      Change management

    Correct Answer
    D. Change management
  • 26. 

    Which of the following is a list of discrete entries that are known to be benign?

    • A.

      Whitelist

    • B.

      Signature

    • C.

      Blacklist

    • D.

      ACL

    Correct Answer
    A. Whitelist
  • 27. 

    Which of the following increases the collision resistance of a hash?

    • A.

      Salt

    • B.

      Increase the input length

    • C.

      Rainbow Table

    • D.

      Larger key space

    Correct Answer
    A. Salt
  • 28. 

    A programmer has decided to alter the server variable in the coding of an authentication function for a proprietary sales application. Before implementing the new routine on the production application server, which of the following processes should be followed?

    • A.

      Change management

    • B.

      Secure disposal

    • C.

      Password complexity

    • D.

      Chain of custody

    Correct Answer
    A. Change management
  • 29. 

    When deploying 50 new workstations on the network, which of following should be completed FIRST?

    • A.

      Install a word processor

    • B.

      Run the latest spyware

    • C.

      Apply the baseline configuration

    • D.

      Run OS updates

    Correct Answer
    C. Apply the baseline configuration
  • 30. 

    Which of the following should be implemented to have all workstations and servers isolated in their own broadcast domains?

    • A.

      VLANs

    • B.

      NAT

    • C.

      Access lists

    • D.

      Intranet

    Correct Answer
    A. VLANs
  • 31. 

    End users are complaining about receiving a lot of email from online vendors and  pharmacies.Which of the following is this an example of?

    • A.

      Trojan

    • B.

      Spam

    • C.

      Phishing

    • D.

      DNS Poisoning

    Correct Answer
    B. Spam
  • 32. 

    Which of the following BEST describes a private key in regards to asymmetric encryption?

    • A.

      The key owner has exclusive access to the private key

    • B.

      Everyone has access to the private key on the CA

    • C.

      Only the CA has access to the private key

    • D.

      The key owner and a recipient of an encrypted email have exclusive access to the private key

    Correct Answer
    A. The key owner has exclusive access to the private key
  • 33. 

    Which of the following logs might reveal the IP address and MAC address of a rogue device within the local network?

    • A.

      Security logs

    • B.

      DHCP logs

    • C.

      DNS logs

    • D.

      Antivirus logs

    Correct Answer
    B. DHCP logs
  • 34. 

    Which of the following is commonly used in a distributed denial of service (DDOS) attack?

    • A.

      Phishing

    • B.

      Adware

    • C.

      Botnet

    • D.

      Trojan

    Correct Answer
    C. Botnet
  • 35. 

    Which of the following practices is MOST relevant to protecting against operating system security flaws?

    • A.

      Network intrusion detection

    • B.

      Patch management

    • C.

      Firewall configuration

    • D.

      Antivirus selection

    Correct Answer
    B. Patch management
  • 36. 

    Which of the following is a best practice for coding applications in a secure manner?

    • A.

      Input validation

    • B.

      Object oriented coding

    • C.

      Rapid Application Development (RAD)

    • D.

      Cross-site scriptings

    Correct Answer
    A. Input validation
  • 37. 

    Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?

    • A.

      Intrusion detection

    • B.

      Virtualization

    • C.

      Kiting

    • D.

      Cloning

    Correct Answer
    B. Virtualization
  • 38. 

    Which of the following network tools would provide the information on what an attacker is doing to compromise a system?

    • A.

      Proxy serverl

    • B.

      Honeypot

    • C.

      Internet content filters

    • D.

      Firewall

    Correct Answer
    B. Honeypot
  • 39. 

    Assigning proper security permissions to files and folders is the primary method of mitigating which of the following?

    • A.

      Hijacking

    • B.

      Policy subversion

    • C.

      Trojan

    • D.

      DoS

    Correct Answer
    C. Trojan
  • 40. 

    Which of the following logical access controls would be MOST appropriate to use when creating an account for a temporary worker?

    • A.

      ACL

    • B.

      Account expiration

    • C.

      Time of day restrictions

    • D.

      Logical tokens

    Correct Answer
    B. Account expiration
  • 41. 

    Which of the following may be an indication of a possible system compromise?

    • A.

      A port monitor utility shows that there are many connections to port 80 on the Internet facing web server.

    • B.

      A performance monitor indicates a recent and ongoing drop in speed, disk space or memory utilization from the baseline.

    • C.

      A protocol analyzer records a high number of UDP packets to a streaming media server on the Internet.

    • D.

      The certificate for one of the web servers has expired and transactions on that server begins to drop rapidly.

    Correct Answer
    B. A performance monitor indicates a recent and ongoing drop in speed, disk space or memory utilization from the baseline.
  • 42. 

    An administrator suspects that files are being copied to a remote location during off hours. The file server does not have logging enableD. Which of the following logs would be the BEST place to look for information?

    • A.

      Intrusion detection logs

    • B.

      Firewall logs

    • C.

      Antivirus logs

    • D.

      DNS logs

    Correct Answer
    B. Firewall logs
  • 43. 

    Which of the following access control methods gives the owner control over providingpermissions?

    • A.

      Role-Based Access Control (RBAC)

    • B.

      Rule-Based Access control (RBAC)

    • C.

      Mandatory Access Control (MAC)

    • D.

      Discretionary Access Control (DAC)

    Correct Answer
    D. Discretionary Access Control (DAC)
  • 44. 

    Which of the following access control methods grants permissions based on the users position in the company?

    • A.

      Mandatory Access Control (MAC)

    • B.

      Rule-Based Access control (RBAC)

    • C.

      Discretionary Access Control (DAC)

    • D.

      Role-Based Access Control (RBAC)

    Correct Answer
    D. Role-Based Access Control (RBAC)
  • 45. 

    Which of the following access control methods includes switching work assignments at presetintervals?

    • A.

      Job rotation

    • B.

      Mandatory vacations

    • C.

      Least privilege

    • D.

      Separation of duties

    Correct Answer
    A. Job rotation
  • 46. 

    Which of the following authentication methods would MOST likely prevent an attacker from being able to successfully deploy a replay attack?

    • A.

      TACACS

    • B.

      RAS

    • C.

      RADIUS

    • D.

      Kerberos

    Correct Answer
    D. Kerberos
  • 47. 

    Which of the following would an attacker use to footprint a system?

    • A.

      RADIUS

    • B.

      Password cracker

    • C.

      Port scanner

    • D.

      Man-in-the-middle attack

    Correct Answer
    C. Port scanner
  • 48. 

    Which of the following ensures a user cannot deny having sent a message?

    • A.

      Availability

    • B.

      Integrity

    • C.

      Non-repudiation

    • D.

      Confidentiality

    Correct Answer
    C. Non-repudiation
  • 49. 

    Which of the following allows an attacker to embed a rootkit into a picture?

    • A.

      Trojan horse

    • B.

      Worm

    • C.

      Steganography

    • D.

      Virus

    Correct Answer
    C. Steganography
  • 50. 

    Which of the following is a publication of inactivated user certificates?

    • A.

      Certificate revocation list

    • B.

      Certificate suspension

    • C.

      Recovery agent

    • D.

      Certificate authority

    Correct Answer
    A. Certificate revocation list

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 30, 2011
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 17, 2010
    Quiz Created by
    Tlamot01
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.