Security + 2009 _ Quiz - 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By MYWORKCERTS
M
MYWORKCERTS
Community Contributor
Quizzes Created: 1 | Total Attempts: 993
Questions: 10 | Attempts: 993

SettingsSettingsSettings
Security + 2009 _ Quiz - 1 - Quiz



The CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. Security threats are increasing in number and severity, and the gap between the need for security professionals and qualified IT personnel is the largest of any IT specialty, according to a 2008 CompTIA study. Even in a troubled economy, most businesses plan to maintain or increase their investment in security. CompTIA Security+ is an international, vendor-neutral certification that proves competency in system security, network infrastructure, access control and organizational security. Major organizations that employ CompTIA Security+ certified staff include Booz Allen Read moreHamilton, Hewlett-Packard, IBM, Motorola, Symantec, Telstra, Hitachi, Ricoh, Lockheed Martin, Unisys, Hilton Hotels Corp., General Mills, the U. S. Navy, Army, Air Force and Marines. Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years of technical networking experience, with an emphasis on security. The CompTIA Network+ certification is also recommended.


Questions and Answers
  • 1. 

    All of the following provide confidentiality protection as part of the underlying protocol EXCEPT

    • A.

      SSL.

    • B.

      SSH.

    • C.

      L2TP.

    • D.

      IPSeC.

    Correct Answer
    C. L2TP.
    Explanation
    L2TP (Layer 2 Tunneling Protocol) does not provide confidentiality protection as part of its underlying protocol. SSL (Secure Sockets Layer), SSH (Secure Shell), and IPSeC (Internet Protocol Security) all offer confidentiality protection by encrypting data transmitted over the network. However, L2TP is primarily used for creating virtual private networks (VPNs) and does not include built-in encryption mechanisms. Therefore, L2TP is the correct answer as it does not provide confidentiality protection.

    Rate this question:

  • 2. 

    Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?

    • A.

      Steganography

    • B.

      Worm

    • C.

      Trojan horse

    • D.

      Virus

    Correct Answer
    A. Steganography
    Explanation
    Steganography is a technique used to hide secret data within an innocent-looking file or image. It allows an attacker to manipulate files by using the least significant bits to secretly embed data. This means that the attacker can modify the binary representation of a file by changing the least significant bits without significantly altering the file's appearance or functionality. This covert technique makes it difficult for anyone to detect the presence of hidden data, making it a useful tool for attackers who want to conceal information.

    Rate this question:

  • 3. 

    Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?

    • A.

      Teardrop

    • B.

      TCP/IP hijacking

    • C.

      Phishing

    • D.

      Replay

    Correct Answer
    B. TCP/IP hijacking
    Explanation
    TCP/IP hijacking is a type of attack where an attacker intercepts and manipulates TCP/IP packets to gain unauthorized access or control over a network connection. In this case, the attacker can capture HTTP requests and send back a spoofed page, tricking the user into thinking they are interacting with a legitimate website or service. This allows the attacker to steal sensitive information such as login credentials or financial data.

    Rate this question:

  • 4. 

    How should a company test the integrity of its backup data?

    • A.

      A. By conducting another backup

    • B.

      B. By using software to recover deleted files

    • C.

      C. By restoring part of the backup

    • D.

      D. By reviewing the written procedures

    Correct Answer
    C. C. By restoring part of the backup
    Explanation
    To test the integrity of its backup data, a company should restore part of the backup. This involves actually retrieving and accessing a portion of the backed-up data to ensure that it is recoverable and usable. This process helps to verify that the backup system is functioning properly and that the data can be successfully restored in the event of a data loss or disaster. Conducting another backup, using software to recover deleted files, and reviewing written procedures are not direct methods of testing the integrity of the backup data.

    Rate this question:

  • 5. 

    Which of following can BEST be used to determine the topology of a network and discover unknown devices?

    • A.

      A. Vulnerability scanner

    • B.

      B. NIPS

    • C.

      C. Protocol analyzer

    • D.

      D. Network mapper

    Correct Answer
    D. D. Network mapper
    Explanation
    A network mapper is a tool that can be used to discover and map the topology of a network. It can scan the network and identify devices, their IP addresses, and how they are connected. This information helps in understanding the structure and layout of the network, including any unknown devices that may be present. A vulnerability scanner is used to identify security vulnerabilities, a NIPS (Network Intrusion Prevention System) is used to detect and prevent network attacks, and a protocol analyzer is used to capture and analyze network traffic. While these tools are useful in their respective areas, they do not specifically focus on determining the network topology and discovering unknown devices like a network mapper does.

    Rate this question:

  • 6. 

    When should a technician perform penetration testing?

    • A.

      A. When the technician suspects that weak passwords exist on the network

    • B.

      B. When the technician is trying to guess passwords on a network

    • C.

      C. When the technician has permission from the owner of the network

    • D.

      D. When the technician is war driving and trying to gain access

    Correct Answer
    C. C. When the technician has permission from the owner of the network
    Explanation
    A technician should perform penetration testing when they have permission from the owner of the network. This ensures that the testing is conducted legally and ethically, as unauthorized penetration testing can be considered illegal and can lead to serious consequences. By obtaining permission, the technician can assess the security of the network, identify vulnerabilities, and provide recommendations for improving the network's defenses.

    Rate this question:

  • 7. 

    An administrator has implemented a new SMTP service on a server. A public IP address translates to the internal SMTP server. The administrator notices many sessions to the server, and gets notification that the servers public IP address is now reported in a spam real-time block list.Which of the following is wrong with the server?

    • A.

      A. SMTP open relaying is enableD

    • B.

      B. It does not have a spam filter.

    • C.

      C. The amount of sessions needs to be limiteD.

    • D.

      D. The public IP address is incorrect.

    Correct Answer
    A. A. SMTP open relaying is enableD
    Explanation
    SMTP open relaying allows anyone to use the server to send emails, making it vulnerable to being used for spamming. This is likely the reason why the server's public IP address is reported in a spam real-time block list. To prevent this, the administrator should disable SMTP open relaying on the server.

    Rate this question:

  • 8. 

    Which of the following is MOST efficient for encrypting large amounts of data?

    • A.

      A. Hashing algorithms

    • B.

      B. Symmetric key algorithms

    • C.

      C. Asymmetric key algorithms

    • D.

      D. ECC algorithms

    Correct Answer
    B. B. Symmetric key algorithms
    Explanation
    Symmetric key algorithms are the most efficient for encrypting large amounts of data because they use a single key for both encryption and decryption, allowing for faster processing. In contrast, asymmetric key algorithms require a pair of keys, which slows down the encryption process. Hashing algorithms, on the other hand, are not used for encryption but for creating a fixed-size representation of data. ECC algorithms are a type of asymmetric key algorithm and therefore are not as efficient as symmetric key algorithms for encrypting large amounts of data.

    Rate this question:

  • 9. 

    Which of the following is a reason why a company should disable the SSID broadcast of the wireless access points?

    • A.

      A. Rogue access points

    • B.

      B. War driving

    • C.

      C. Weak encryption

    • D.

      D. Session hijacking

    Correct Answer
    B. B. War driving
    Explanation
    Disabling the SSID broadcast of the wireless access points can help prevent war driving. War driving is the act of searching for and mapping out wireless networks by driving around with a wireless-enabled device. By disabling the SSID broadcast, the network is not visible to potential attackers, making it more difficult for them to identify and target the network. This helps enhance the security of the company's wireless network.

    Rate this question:

  • 10. 

    Which of the following BEST describes ARP?

    • A.

      A. Discovering the IP address of a device from the MAC address

    • B.

      B. Discovering the IP address of a device from the DNS name

    • C.

      C. Discovering the MAC address of a device from the IP address

    • D.

      D. Discovering the DNS name of a device from the IP address

    Correct Answer
    C. C. Discovering the MAC address of a device from the IP address
    Explanation
    ARP (Address Resolution Protocol) is used to discover the MAC address of a device from its IP address. It is a protocol used in computer networks to map an IP address to a physical or MAC address. This mapping is necessary for devices to communicate with each other on a local network. By using ARP, a device can determine the MAC address of another device on the network, allowing it to send data packets directly to that device.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.