Security+ Practice Certification Exam

33 Questions | Total Attempts: 215

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Practice Exam - CompTIA Security+ Certification


Questions and Answers
  • 1. 
    Protecting your data from being revealed to unauthorized users is an example of ________ .
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Signing

    • D. 

      Hashing

  • 2. 
    An AUTHORIZED user while accessing a system is flagged by the IDS as an INTRUDER.  This is called a ______.
    • A. 

      Non-Negative

    • B. 

      Non-Intrusion

    • C. 

      False Positive

    • D. 

      False Alarm

  • 3. 
    Which service either PERMITs or DENYs a user permission to view or change file data?
    • A. 

      Access control

    • B. 

      Data authentication

    • C. 

      Data confidentiality

    • D. 

      Data integrity

  • 4. 
    With Mandatory Access Control, subjects (users) must have  _______  that are equal to or higher than what is assigned to the object (system, data file) to which access is being attempted.
    • A. 

      Access control lists

    • B. 

      Sensitivity labels

    • C. 

      Tickets

    • D. 

      Tokens

  • 5. 
    Of the protocols listed below, which one is an older tunneling protocol that works with IP only?
    • A. 

      IPX

    • B. 

      L2TP

    • C. 

      PPTP

    • D. 

      SSH

  • 6. 
    IPSec carries the _____ which provides assurance of legitimacy of the transmission.
    • A. 

      Secure Shell (SSH)

    • B. 

      Password Authentication Protocol (PAP)

    • C. 

      Authentication Header (AH)

    • D. 

      Internet Protocol (IP)

  • 7. 
    Symmetric Cryptography has several advantages, but sadly one LARGE disadvantage,  ________ .
    • A. 

      Speed

    • B. 

      Key distribution

    • C. 

      Weak algorithms

    • D. 

      Memory management

  • 8. 
    _____  based on an algorithm called Rijndael, a word formed from the combination of the names of the two Belgian cryptographers who developed it.  Rijndael beat out 15 competing designs for adoption by both NIST and NSA.
    • A. 

      AES (Advanced Encryption Standard)

    • B. 

      3DES (Triple Data Encryption Standard)

    • C. 

      DES (Data Encryption Standard)

    • D. 

      Blowfish

  • 9. 
    When sender and receiver use different keys, the encryption scheme is called _______ .
    • A. 

      Symmetric

    • B. 

      Blowfish

    • C. 

      Skipjack

    • D. 

      Asymmetric

  • 10. 
    _______ is an asymmetric algorithm?
    • A. 

      CAST (Carlisle Adams Stafford Tavares)

    • B. 

      RC5 (Rivest Cipher 5)

    • C. 

      RSA (Rivest Shamir Adelman)

    • D. 

      SHA-1 (Secure Hashing Algorithm 1)

  • 11. 
    All users should be made aware of the weakest security link,  ________ .
    • A. 

      Firewalls

    • B. 

      Routers

    • C. 

      Viruses

    • D. 

      People

  • 12. 
    An Intrusion Detection System cannot protect a network form _______ .
    • A. 

      DoS (Denial of Service)

    • B. 

      Exploits of system bugs

    • C. 

      Spoofed e-mail

    • D. 

      Port scan

  • 13. 
    TACACS uses port _____ .
    • A. 

      21

    • B. 

      161

    • C. 

      53

    • D. 

      49

  • 14. 
    Secure Shell (SSH) uses both ____ and port ___ .
    • A. 

      TCP (Transmission Control Protocol), 22

    • B. 

      UDP (User Datagram Protocol), 69

    • C. 

      TCP (Transmission Control Protocol), 179

    • D. 

      UDP (User Datagram Protocol), 17

  • 15. 
    Professional codes of conduct require computer forensic experts to protect IT evidence gathered from a crime scene.  This important guideline is known as _______ .
    • A. 

      Evidence protection

    • B. 

      Chain of custody

    • C. 

      Chain of command

    • D. 

      Incident response

  • 16. 
    An attacker may overload a server by not responding with the third segment of a TCP Three Way Handshake.  This is known as a _____ attack.
    • A. 

      Man in the Middle

    • B. 

      Smurf

    • C. 

      Teardrop

    • D. 

      SYN (Synchronize)

  • 17. 
    A worm is ______ whereas a Trojan is not.
    • A. 

      Spread by way of e-mail

    • B. 

      Self replicating

    • C. 

      A form of malicious code

    • D. 

      Self destructing

  • 18. 
    Attackers commonly use this method to locate wireless networks.
    • A. 

      War driving

    • B. 

      Stake out

    • C. 

      War dialing

    • D. 

      Stake in

  • 19. 
    Lack of attention to proper programming practices leads to application that may suffer from ______ .
    • A. 

      CGI (Common Gateway Interface) script

    • B. 

      Birthday

    • C. 

      Buffer overflow

    • D. 

      Dictionary

  • 20. 
    Attackers may alter ICMP (Internet Control Message Protocol) transmissions to initiate a _____ .
    • A. 

      Man in the Middle attack

    • B. 

      Smurf attack

    • C. 

      Ping of death attack

    • D. 

      TCP SYN (Transmission Control Protocol / Synchronized) attack

  • 21. 
    Attacks may be detected by monitoring for ________   which amount to known bit patterns.
    • A. 

      Viruses

    • B. 

      Signatures

    • C. 

      Hackers

    • D. 

      Malware

  • 22. 
    Misrepresenting a computer with the identifying address information of another is called ______ .
    • A. 

      DoS (Denial of Service)

    • B. 

      Spoofing

    • C. 

      Brure force attack

    • D. 

      Reverse DNS (Domain Name Service)

  • 23. 
    A _____ attaches itself to an otherwise normal program, resulting in an infection that may spread to other programs doing harm each location.
    • A. 

      Replicator

    • B. 

      Virus

    • C. 

      Trojan horse

    • D. 

      Logic bomb

  • 24. 
    A password which has been hashed for security, may yet be revealed by a ________ attack.
    • A. 

      Man in the Middle

    • B. 

      Brute force

    • C. 

      Reverse engineering

    • D. 

      DoS (Denial of Service)

  • 25. 
    A ____ attack may not steal or corrupt data, but it does overwhelm the system, denying access to legitimate users.
    • A. 

      ACL

    • B. 

      BBC

    • C. 

      CVS

    • D. 

      DOS

  • 26. 
    Encrypting a message before sending it across the internet addresses which fundamental security objective?
    • A. 

      Authentication

    • B. 

      Integrity

    • C. 

      Confidentiality

    • D. 

      Non-repudiation

  • 27. 
    You discover that a session with a distant server is being monitored and altered by a third party.  This is known as a ______ attack.
    • A. 

      DDos

    • B. 

      Back Door

    • C. 

      Spoofing

    • D. 

      Man in the Middle

  • 28. 
    A server is placed in your network with the goal of attracting and monitoring attackers.  This kind of server is known as a ________ .
    • A. 

      Honey pot

    • B. 

      Lame duck

    • C. 

      Teaser

    • D. 

      Pigeon

  • 29. 
    While each of the methods listed below is appropriate for combating the threat of “dumpster diving”, which is the MOST important?
    • A. 

      Increased security staff

    • B. 

      Paper and media distruction

    • C. 

      Video surveillance equipment

    • D. 

      Frequent trash removal

  • 30. 
    TLS is the updated version of _____.
    • A. 

      ACL

    • B. 

      AES

    • C. 

      SSH

    • D. 

      SSL

  • 31. 
    Your have been asked to assess the security of a network.  The _______ stage of the assessment involves identifying weaknesses and attempting to defeat the security system.
    • A. 

      Penetration

    • B. 

      Control

    • C. 

      Audit planning

    • D. 

      Discovery

  • 32. 
    The arrival of a Digital Signature along with a message gives what assurance to the recipient?
    • A. 

      Authentication

    • B. 

      Integrity

    • C. 

      Confidentiality

    • D. 

      Non-repudiation

  • 33. 
    What protocol is commonly used with e-mail?
    • A. 

      S/MIME

    • B. 

      HTTPS

    • C. 

      SSH

    • D. 

      SSL