CompTIA Security+

24 Questions | Attempts: 951
Share

SettingsSettingsSettings
Security Plus Quizzes & Trivia

CompTIA Security+ Quiz


Questions and Answers
  • 1. 

    What does a security zone include?

    • A.

      DMZ, Firewalls, Routers, Extranets, Intranets

    • B.

      Remote access, Ldap, ISA

    • C.

      Chap, Rbac, DoS

    • D.

      Ports, TCP, UDP

    Correct Answer
    A. DMZ, Firewalls, Routers, Extranets, Intranets
    Explanation
    These areas which include DMZ,extranet and intranets, are created by using firewalls and routers on a network.

    Rate this question:

  • 2. 

    What are ports used for on network firewalls.

    • A.

      For password creation

    • B.

      For CHAP authentication

    • C.

      To create a PKI for sharing on a network

    • D.

      To increase security, block and all unused ports

    Correct Answer
    D. To increase security, block and all unused ports
    Explanation
    To permit only the ports needed for access, keep in mind that blocking ports might disable needed services.

    Rate this question:

  • 3. 

    What are the correct port numbers for:FTP, SMTP, DNS, HTTP, HTTPS, and POP3?

    • A.

      80, 443, 23, 21,56 and 89

    • B.

      21, 25, 53, 80, 443 and 110

    • C.

      21, 1723, 1812, 80, 443 and 23

    • D.

      25, 21, 56, 80, 143 and 443

    Correct Answer
    B. 21, 25, 53, 80, 443 and 110
    Explanation
    Know your ports, they are important.

    Rate this question:

  • 4. 

    What does a router do?

    • A.

      Host web sites.

    • B.

      Install the latest security patches.

    • C.

      Performs harddisk scans with antivirus software.

    • D.

      Routes traffic from one network to another network.

    Correct Answer
    D. Routes traffic from one network to another network.
  • 5. 

    What is DoS?

    • A.

      Disk Operating System

    • B.

      Denial of System

    • C.

      Denial of Service

    • D.

      Death of System

    Correct Answer
    C. Denial of Service
  • 6. 

    What is a Smurf attack?

    • A.

      The attacker ususe a sniffer to listen to and repeat messages.

    • B.

      A secret combination of keystrokes.

    • C.

      A non OS specific attack that uses a third party's network segment to overwhelm a host with a flood of ICMP packets.

    • D.

      Filter incoming packets for broadcast address.

    Correct Answer
    C. A non OS specific attack that uses a third party's network segment to overwhelm a host with a flood of ICMP packets.
  • 7. 

    What is a virus?

    • A.

      Lies dormant until triggered by a specific event.

    • B.

      Breaks into system by guessing users password.

    • C.

      Acts as a storage device for PC.

    • D.

      Spreads from system to system by attaching itself to data or other files.

    Correct Answer
    D. Spreads from system to system by attaching itself to data or other files.
  • 8. 

    Malicious software known as a worm does what?

    • A.

      Exploits network vurnerabilities with the intent of propagating itself.

    • B.

      Lies dormant until triggered by a specific event.

    • C.

      Spreads from system to system by attaching itself to data or other files.

    • D.

      The attacker using a sniffer to listen to and repeat messages.

    Correct Answer
    A. Exploits network vurnerabilities with the intent of propagating itself.
  • 9. 

    What are some countermeasures used to protect against malicious software?

    • A.

      Don't open email from unknown sources.

    • B.

      Install the latest security updates.

    • C.

      Install antivirus software and maintain current signature updates.

    • D.

      Install and configuration of firewall software.

    Correct Answer(s)
    A. Don't open email from unknown sources.
    B. Install the latest security updates.
    C. Install antivirus software and maintain current signature updates.
  • 10. 

    What is DDoS?

    • A.

      Denial Distributed of Service

    • B.

      Distributed Denial of Service.

    • C.

      Distributed Denial of System.

    • D.

      Disk Denial of Service.

    Correct Answer
    B. Distributed Denial of Service.
  • 11. 

    Breaks into system by guessing the victims password is.

    • A.

      Dictionary approach.

    • B.

      Birthday attack.

    • C.

      Password guessing.

    • D.

      Password attack.

    Correct Answer
    C. Password guessing.
  • 12. 

    What is a Man-in-the middle.

    • A.

      Updates DNS software to latest version.

    • B.

      Displays the browser's address bar.

    • C.

      Disables source routing on all internet routers.

    • D.

      Attacker places himself between two communicating hosts and listens in on their session.

    • E.

      Attacker with a wireless notebook to explore wireless LAN's.

    Correct Answer
    D. Attacker places himself between two communicating hosts and listens in on their session.
  • 13. 

    What is Web spoofing.

    • A.

      The attacker convinces victims that they're visiting a legitimate Web site when they are in fact visiting a site that has been created or modified by the attacker.

    • B.

      Attacker places himself between two communicating hosts and listens in on their session.

    • C.

      The attacker mainipulates the DNS server to redirect users to an attacker's server.

    • D.

      Attacker with a wireless notebook to explore wireless LAN's.

    Correct Answer
    A. The attacker convinces victims that they're visiting a legitimate Web site when they are in fact visiting a site that has been created or modified by the attacker.
  • 14. 

    What is DNS spoofing?

    • A.

      The attacker uses this method to corrupt the routing tables.

    • B.

      The attacker convinces victims that they're visiting a legitimate Web site when they are in fact visiting a site that has been created or modified by the attacker.

    • C.

      A directory where the certificates are held.

    • D.

      The attacker mainipulates the DNS server to redirect users to an attacker's server

    Correct Answer
    D. The attacker mainipulates the DNS server to redirect users to an attacker's server
  • 15. 

    The three type of Access controls are?

    • A.

      MAC, BAC, SAC

    • B.

      MAC, DAC, RACK

    • C.

      MAC, DAC, RBAC

    • D.

      MAC RDAC, RMAC

    Correct Answer
    C. MAC, DAC, RBAC
  • 16. 

    What does RBAC mean?

    • A.

      Role Based Access Controller

    • B.

      Role Based Access Control

    • C.

      Role Base Access Controller

    • D.

      Role Base Access Control

    Correct Answer
    B. Role Based Access Control
  • 17. 

    What are the three basic steps of CHAP?

    • A.

      Response hash, Challenge message, Success or failure.

    • B.

      Challenge message, Response hash, Resource and Server.

    • C.

      Challenge message, Response hash, Success or failure.

    • D.

      Success or failure, Challenge message, Response hash.

    Correct Answer
    C. Challenge message, Response hash, Success or failure.
  • 18. 

    Cryptography has two types of algorithms.

    • A.

      Symmetric, Asymmetric

    • B.

      PKI, Symmetric

    • C.

      Asymmetric, Kerberos

    • D.

      Host based IDS, Network based IDS

    Correct Answer
    A. Symmetric, Asymmetric
  • 19. 

    Uses a single key . The encryption key can be calculated from the decryption key and vice versa.

    • A.

      Asymmetric

    • B.

      Symmetric

    • C.

      Kerberos

    • D.

      Hashing

    Correct Answer
    B. Symmetric
  • 20. 

    Uses different keys for encryption and decryption.

    • A.

      Asymmetric

    • B.

      Symmetric

    • C.

      Hashing

    • D.

      Kerberos

    Correct Answer
    A. Asymmetric
  • 21. 

    What are some of the Web Security used.

    • A.

      Ssl, Tls, Https

    • B.

      Sls, Tls, Https

    • C.

      Ssl, Tsl, Https

    • D.

      Ssl, Tls, Http

    Correct Answer
    A. Ssl, Tls, Https
  • 22. 

    IPSec provides two services.

    • A.

      Ha, Psp

    • B.

      Ah, Esr

    • C.

      Ah, Esp

    • D.

      Pptp, L2pt

    Correct Answer
    C. Ah, Esp
  • 23. 

    What is VPN used for.

    • A.

      Translation of network address across the LAN and WAN.

    • B.

      Translation of network address across the LAN.

    • C.

      Provides remote offices or uses with secure access across a public internet to company office.

    • D.

      WAN protocol for Virtual email.

    Correct Answer
    C. Provides remote offices or uses with secure access across a public internet to company office.
  • 24. 

    What is the specification for a wireless LAN.

    • A.

      802.9x

    • B.

      802.11x

    • C.

      802.8x

    • D.

      802.12x

    Correct Answer
    B. 802.11x
    Explanation
    802.11a, 802.11b, 802.11g, 802.11n

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 07, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 26, 2009
    Quiz Created by
    Fischer
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.