Security Plus Questions: CompTIA Quiz!

47 Questions | Total Attempts: 22

SettingsSettingsSettings
CompTIA Quizzes & Trivia

CompTIA Security+ is an entry-level certification that develops network security knowledge. CompTIA certification covers IT concepts, basic IT literacy, and terminology. It's the first step toward the A+ certification. Take this quiz to test your fundamentals about Comptia security+. Let's try it out. All the best!


Questions and Answers
  • 1. 
    A security analyst captures forensic evidence from a potentially compromised system for further investigation. The evidence is documented and securely stored to FIRST:
    • A. 

      Maintain the chain of custody.

    • B. 

      Preserve the data.

    • C. 

      Obtain a legal hold.

    • D. 

      Recover data at a later time

  • 2. 
    A security analyst is investigating a security breach. Upon inspection of the audit and access logs, the analyst notices the host was accessed and the /etc/passwd file was modified with a new entry for username “gotcha” and user ID of 0. Which of the following are the MOST likely attack vector and tool the analyst should use to determine if the attack is still ongoing? 
    • A. 

      Logic bomb

    • B. 

      Backdoor

    • C. 

      Keylogger

    • D. 

      Netstat

    • E. 

      Tracert

    • F. 

      Ping

  • 3. 
    A company recently replaced its unsecured email server with a cloud-based email and collaboration solution that is managed and insured by a third party. Which of the following actions did the company take regarding risks related to its email and collaboration services?
    • A. 

      Transference

    • B. 

      Acceptance

    • C. 

      Mitigation

    • D. 

      Deterrence

  • 4. 
    A datacenter recently experienced a breach. When access was gained, an RF device was used to access an air-gapped and locked server rack. Which of the following would BEST prevent this type of attack?
    • A. 

      Faraday cage

    • B. 

      Smart cards

    • C. 

      Infrared detection

    • D. 

      Alarms

  • 5. 
    A security analyst is working on a project that requires the implementation of a stream cipher. Which of the following should the analyst use?
    • A. 

      Hash function

    • B. 

      Elliptic curve

    • C. 

      Symmetric algorithm

    • D. 

      Public key cryptography

  • 6. 
    Which of the following would allow for the QUICKEST restoration of a server into a warm recovery site in a case in which server data mirroring is not enabled?
    • A. 

      Full backup

    • B. 

      Incremental backup

    • C. 

      Differential backup

    • D. 

      Snapshot

  • 7. 
    In determining when it may be necessary to perform a credentialed scan against a system instead of a non-credentialed scan, which of the following requirements is MOST likely to influence this decision?
    • A. 

      The scanner must be able to enumerate the host OS of devices scanned.

    • B. 

      The scanner must be able to footprint the network.

    • C. 

      The scanner must be able to check for open ports with listening services

    • D. 

      The scanner must be able to audit file system permissions

  • 8. 
    The computer resource center issued smartphones to all first-level and above managers. The managers have the ability to install mobile tools. Which of the following tools should be implemented to control the types of tools the managers install?
    • A. 

      Download manager

    • B. 

      Content manager

    • C. 

      Segmentation manager

    • D. 

      Application manager

  • 9. 
    Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host?
    • A. 

      Remote exploit

    • B. 

      Amplification

    • C. 

      Sniffing

    • D. 

      Man-in-the-middle

  • 10. 
    A security auditor is putting together a report for the Chief Executive Officer (CEO) on personnel security and its impact on the security posture of the whole organization. Which of the following would be the MOST important factor to consider when it comes to personnel security?
    • A. 

      Insider threats

    • B. 

      Privilege escalation

    • C. 

      Hacktivist

    • D. 

      Phishing through social media

    • E. 

      Corporate espionage

  • 11. 
    A security administrator wants to configure a company’s wireless network in a way that will prevent wireless clients from broadcasting the company’s SSID. Which of the following should be configured on the company’s access points?
    • A. 

      Enable ESSID broadcast

    • B. 

      Enable protected management frames

    • C. 

      Enable wireless encryption

    • D. 

      Disable MAC authentication

    • E. 

      Disable WPS

    • F. 

      Disable SSID broadcast

  • 12. 
    A wireless network has the following design requirements:     Authentication must not be dependent on enterprise directory service   It must allow background reconnection for mobile users   It must not depend on user certificates   Which of the following should be used in the design to meet the requirements? 
    • A. 

      PEAP

    • B. 

      PSK

    • C. 

      Open systems authentication

    • D. 

      EAP-TLS

    • E. 

      Captive portals

  • 13. 
    Which of the following strategies should a systems architect use to minimize availability risks due to insufficient storage capacity?
    • A. 

      High availability

    • B. 

      Scalability

    • C. 

      Distributive allocation

    • D. 

      Load balancing

  • 14. 
    A security engineer wants to implement a site-to-site VPN that will require SSL certificates for mutual authentication. Which of the following should the engineer implement if the design requires client MAC address to be visible across the tunnel?
    • A. 

      Tunnel mode IPSec

    • B. 

      Transport mode VPN IPSec

    • C. 

      L2TP

    • D. 

      SSL VPN

  • 15. 
    After surfing the Internet, Joe, a user, woke up to find all his files were corrupted. His wallpaper was replaced by a message stating the files were encrypted and he needed to transfer money to a foreign country to recover them. Joe is a victim of:
    • A. 

      A keylogger.

    • B. 

      Spyware.

    • C. 

      Ransomware.

    • D. 

      A logic bomb

  • 16. 
    Security administrators attempted corrective action after a phishing attack. Users are still experiencing trouble logging in, as well as an increase in account lockouts. Users' email contacts are complaining of an increase in spam and social networking requests. Due to a large number of affected accounts, remediation must be accomplished quickly.     Which of the following actions should be taken FIRST? (Select TWO)
    • A. 

      Disable the compromised accounts

    • B. 

      Update WAF rules to block social networks

    • C. 

      Remove the compromised accounts with all AD groups

    • D. 

      Change the compromised accounts' passwords

    • E. 

      Disable the open relay on the email server

    • F. 

      Enable sender policy framework

  • 17. 
    Which of the following allows an auditor to test proprietary-software compiled code for security flaws?
    • A. 

      Fuzzing

    • B. 

      Static preview

    • C. 

      Code signing

    • D. 

      Regression testing

  • 18. 
    Ann, a user, states that her machine has been behaving erratically over the past week. She has experienced slowness and input lag and found text files that appear to contain pieces of her emails or online conversations with coworkers. The technician runs a standard virus scan but detects nothing.   Which of the following types of malware has infected the machine?
    • A. 

      Ransomware

    • B. 

      Rootkit

    • C. 

      Backdoor

    • D. 

      Keylogger

  • 19. 
    Which of the following is the BEST reason for salting a password hash before it is stored in a database?
    • A. 

      To prevent duplicate values from being stored

    • B. 

      To make the password retrieval process very slow

    • C. 

      To protect passwords from being saved in readable format

    • D. 

      To prevent users from using simple passwords for their access credentials

  • 20. 
    An actor downloads and runs a program against a corporate login page. The program imports a list of usernames and passwords, looking for a successful attempt.   Which of the following terms does BEST describe the actor in this situation?
    • A. 

      Script kiddie

    • B. 

      Hacktivist

    • C. 

      Cryptologist

    • D. 

      Security auditor

  • 21. 
    An organization wants to utilize a common, Internet-based third-party provider for authorization and authentication. The provider uses a technology based on OAuth 2.0 to provide required services. To which of the following technologies is the provider referring?
    • A. 

      Open ID Connect

    • B. 

      SAML

    • C. 

      XACML

    • D. 

      LDAP

  • 22. 
    A penetration tester harvests potential usernames from a social networking site. The penetration tester then uses social engineering to obtain associated passwords to gain unauthorized access to shares on a network server.   Which of the following methods is the penetration tester MOST likely using?
    • A. 

      Escalation of privilege

    • B. 

      SQL injection

    • C. 

      Active reconnaissance

    • D. 

      Proxy server

  • 23. 
    Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? 
    • A. 

      An attacker could potentially perform a downgrade attack.

    • B. 

      The connection is vulnerable to resource exhaustion.

    • C. 

      The integrity of the data could be at risk.

    • D. 

      The VPN concentrator could revert to L2TP.

    • E. 

      The IPSec payload reverted to 16-bit sequence numbers.

  • 24. 
    Which of the following is the BEST choice for a security control that represents a preventive and corrective logical control at the same time?
    • A. 

      Security awareness training

    • B. 

      Antivirus

    • C. 

      Firewalls

    • D. 

      Intrusion detection system

  • 25. 
    A web developer improves client access to the company's REST API. Authentication needs to be tokenized but not expose the client's password.   Which of the following methods would BEST meet the developer's requirements?
    • A. 

      SAML

    • B. 

      LDAP

    • C. 

      OAuth

    • D. 

      Shibboleth

Related Topics
Back to Top Back to top