Upgrade to remove ads
CompTIA Security+ Pre-Assessment Exam
Get Quizlet's official Security+ - 1 term, 1 practice question, 1 full practice test
Terms in this set (75)
Management within your organization has defined a use case to support confidentiality of PII stored in a database. Which of the following solutions will BEST meet this need?
b. Digital Signature
d. Smart Card
Management has implemented a policy stating that messages sent between upper-level executives must arrive without any changes. The IT department us tasked with implementing technical controls to meet this need. Which security goal does this policy address?
Your organization recently implemented two servers that act as failover deceives for each other. Which security goal is your organization pursuing?
You are tasked with improving the overall security for a database server. Which of the following is a preventive control that will assist with this goal?
a. Disabling unnecessary services
b. Identifying the initial baseline configuration
c. Monitoring logs for trends
d. Implementing a backup and restoration plan
Disabling unnecessary services
An IT department recently had its hardware budget reduced, but the organization still expects them to maintain availability of services. Of the following choices, what would BEST help them maintain availability with a reduced budget?
a. Failover clusters
You want to test new security controls before deploying them. Which of the following technologies provides the MOST flexibility to meet this goal?
b. Hardening techniques
c. Virtualization technologies
d. Patch management programs
You suspect that traffic in your network is being rerouted to an unauthorized router within your network. Which of the following command-line tools would help you narrow down the problem?
The First Bank of Springfield has been experiencing widespread fraud recently. Attackers are transferring funds out of customer accounts to other banks. The bank began requiring customers to obtain credentials in person at the bank. However, this hasn't reduced the number of fraudulent transactions. After reviewing available logs, investigators determined that these fraudulent transactions are conducted with the customer's actual credentials. Which of the following security controls should be strengthened to reduce these incidents?
An outside security auditor recently completed an in-depth security audit on your network. One of the issues he reported was related to passwords. Specifically, he found the following passwords used on the network: Pa$$, 1@W2, and G7bT3. What should be changed to avoid the problem shown with these passwords?
a. Password complexity
b. Password length
c. Password history
d. Password reuse
When you log on to your online bank account, you are also able to access a partner's credit card site, check-ordering services, and a mortgage site without entering your credentials again. What does this describe?
b. Same sign-on
Your network uses an authentication service based on the X.500 specification. When encrypted, it uses TLS. Which authentication service is your network using?
You're asked to identify who is accessing a spreadsheet containing employee salary data. Detailed logging is configured correctly on this file. However, you are unable to identify a specific person who is accessing the file. What is the MOST likely reason?
a. Shared accounts are not prohibited
b. Guest accounts are disabled
c. Permissions for the file were assigned to a group
d. Account lockout has been enabled
Shared accounts are not prohibited
Interns from a local college frequently work at your company. Some interns work with the database developers, some interns work with the web application developers, and some interns work with both developers. Interns working with the database developers require specific privileges, and interns working with the web application developers require different privileges. What is the simplest method to meet these requirements?
a. Use generic accounts
b. Create user-based privileges
c. Use group-based privileges
d. Grant the interns access to the Guest account
Use group-based priviledges
You are configuring a file server used to share files and folders among employees within your organization. However, employees should not be able to access all folders on this server. Which of the following choices is the BEST method to manage security for these folders?
a. Assign permissions to each user as needed
b. Wait for the users to request permission and then assign the appropriate permissions
c. Delegate authority to assign these permissions
d. Use security groups with appropriate permissions
Use security groups with appropriate permissions
The Retirement Castle uses groups for ease of administration and management. They recently hired Jasper as their new accountant. Jasper needs access to all the files and folders used by the Accounting department. Which of the following should the administrator do to give Jasper appropriate access?
a. Create an account for Jasper and add the account to the Accounting group
b. Give Jasper the password for the Guest account
c. Create an account for Jasper and use rule-based access control for accounting
d. Create an account for Jasper and add the account to the Administrators group
Create an account for Jasper and add the account to the Accounting group
You need to send several large files containing proprietary data to a business partner. Which of the following is the BEST choice for this task?
Your organization is planning to establish a secure link between one of your mail servers and a business partner's mail server. The connection will use the Internet. Which protocol is the BEST choice?
Bart is adding a DMZ into his organization's network. Which of the following is the BEST description of why he would do so?
a. To increase security for servers accessed from public networks
b. To provide a secure physical location for networking equipment
c. To lure attackers to a fake server or fake network
d. To cache data retrieved from a web server
To increase security for servers accessed from public networks
Your organization wants to prevent employees from accessing file sharing web sites. Which of the following choices will meet this need?
a. Content inspection
b. Malware inspection
c. URL filter
d. Web application firewall
Your organization hosts several web servers in a web farm. They have recently been attacked, resulting in an unacceptable downtime. Management wants to implement a solution that will provide protection for the web farm and include load balancing to improve the overall performance of the web farm. Which of the following will BEST meet this need?
a. Stateless firewall
b. Stateful firewall
c. Web application firewall
d. Host-based firewall
Web application firewall
Management suspects that employees have been sending proprietary data out of the network via email. They want to implement a solution that will detect and block similar incidents in the future. Which of the following is the BEST choice to meet this need?
a. Mail gateway
b. UTM appliance
c. Forward proxy
d. Reverse proxy
You are tasked with configuring a switch so that it separates VoIP and data traffic. Which of the following provides the BEST solution?
Your organization hosts an e-commerce business that has become quite successful recently. It includes a web farm and a database server within the DMZ. IT management is concerned that there isn't enough staff working around the clock to protect these servers. Which of the following would provide the BEST automated protection for these servers?
a. NIDS and HIDS
b. NIPS and HIPS
c. SIEM and NIPS
d. SIEM and NIDS
NIPS and HIPS
Management is concerned about malicious activity and wants to implement a security control that will detect unusual traffic on the network. Which of the following is the BEST choice to meet this goal?
a. Network-based firewall
b. Signature-based IDS
c. Anomaly-based IDS
Of the following choices, what can you use to divert malicious attacks on your network away from valuable data to worthless, fabricated data?
b. Proxy server
c. Web application firewall
Your organization frequently has guests visiting in various conference rooms throughout the building. These guests need access to the Internet via the wireless network, but should not be able to access internal network resources. Employees need access to both the internal network and the Internet. Which of the following would BEST meet this need?
Management asks you if you can modify the wireless network to prevent users from easily discovering it. Which of the following would you modify to meet this goal?
b. WPA2 Enterprise
c. SSID broadcast
d. MAC address filter
Marge, a security administrator, is tasked with ensuring that all devices have updated virus definition files before they can access network resources. Which of the following technologies would help her accomplish this goal?
Your organization is hosting a wireless network with an 802.1x server using PEAP. On Thursday, users report they can no longer access the wireless network, but they could access is on the previous day. Administrators verified the network configuration matches the baseline, there aren't any hardware outages, and the wired network is operational. Which of the following is the MOST likely cause for this problem?
a. The RADIUS server certificate expired
b. DNS is providing incorrect host names
c. DHCP is issuing duplicate IP addresses
d. MAC filtering is enabled
The RADIUS server certificate expired
Lisa has created an application on her development computer. She wants to test it on a Linux-based computer she commonly uses for testing. However, she wants to ensure it is isolated when she tests it. Which of the following is the BEST solution to meet her needs?
a. Use chroot
b. Sideload the application
c. Use FDE
d. Use chmod
Your organization has recently purchased some laptops that include a TPM. Which of the following BEST identifies what the TPM provides?
a. Detection of unauthorized data transfers
b. A hardware root of trust
d. An external security device used to store cryptographic keys
A hardware root of trust
Your organization has recently rented access to computing resources via a cloud. Administrators within your organization apply patches to the operating system. Which of the following choices BEST describes this cloud deployment model?
b. Software as a Service
c. Infrastructure as a Service
Infrastructure as a Service
Homer noticed that several generators within the nuclear power plant have been turning on without user interaction. Security investigators discovered that an unauthorized file was installed and causing these generators to start at timed intervals. Further, they determined this file was installed during a visit by external engineers. What should Homer recommend to mitigate this threat in the future?
a. Create an internal CA
b. Implement WPA2 Enterprise
c. Implement patch management processes
d. Configure the SCADA within a VLAN
Configure SCADA within a VLAN
Management wants to ensure that employees do not print any documents that include customer PII. Which of the following solutions would meet this goal?
A tech company recently discovered an attack on its organization, resulting in a significant data breach of customer data. After investigating the attack, they realized it was very sophisticated and likely originated from a foreign country. Which of the following identifies the MOST likely threat actor in this attack?
A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed concern that unauthorized personnel might be able to access data on the server. The security administrator decided to check the server further. Of the following choices, what is the administrator MOST likely looking for on this server?
b. Logic bomb
After Marge turned on her computer, she saw a message indicating that unless she payment, her hard drive would be formatted. What does this indicate?
An organization's security policy requires employees to place all discarded paper documents in containers for temporary storage. These papers are later burned in an incinerator. Which of the following attacks are these actions MOST likely trying to prevent?
a. Shoulder surfing
d. Dumpster diving
Users in your organization have reported receiving a similar email from the same sender. The email included a link, but after recent training on emerging threats, all the users chose not so click the link. Security investigators determined the link was malicious and was designed to download ransomware. Which of the following BEST describes the email?
b. Spear phising
Your local library is planning to purchase new computers that patrons can use for Internet research. Which of the following are the BEST choices to protect these computers? (Select TWO.)
b. Anti-malware software
c. Cable locks
d. Disk encryption
You are troubleshooting an intermittent connectivity issue with a web server. After examining the logs, you identify repeated connection attempts from various IP addresses. You realize these connection attempts are overloading the server, preventing it from responding to other connections. Which of the following is MOST likely occurring?
a. DDoS attack
b. DoS attack
c. Amplification attack
d. Salting attack
You are reviewing security controls and their usefulness. You notice that account lockout policies are in place. Which of the following attacks will these policies thwart? (Select TWO.)
a. DNS poisoning
c. Brute force
d. Buffer overflow
Security analysts recently discovered that users in your organization are inadvertently installing malware on their systems after visiting the comptia.org web site. Users have a legitimate requirement to visit the comptia.org web site. Which of the following is the MOST likely explanation for this activity?
b. Typo squatting
An attacker recently attacked a web server hosted by your company. After investigation, security professionals determined that the attacker used a previously unknown application exploit. Which of the following BEST identifies this attack?
a. Buffer overflow
b. Zero-day attack
d. Session hijacking
While reviewing logs for a web application, a developer notices that it has crashed several times reporting memory error. Shortly after it crashes, the logs show malicious code that isn't part of a known application. Which of the following is MOST likely occurring?
a. Buffer overflow
b. ARP poisoning
c. Privilege escalation
Management at your organization is planning to hire a development firm to create a sophisticated web application. One of their primary goals is to ensure that personnel involved with the project frequently collaborate with each other throughout the project. Which of the following is an appropriate model for this project?
d. Secure DevOps
Your organization is preparing to deploy a web-based application, which will accept user input. Which of the following will BEST test the reliability of this application to maintain availability and data integrity?
a. Model verification
b. Input validation
c. Error handling
d. Dynamic analysis
An attacker has launched several successful XSS attacks on a web application within your DMZ. Which of the following are the BEST choices to protect the web server and prevent this attack? (Select TWO.)
a. Dynamic code analysis
b. Input validation
c. Code obfuscation
Ziffcorp is developing a new technology that they expect to become a huge success when it's released. The CIO is concerned about someone stealing their company secrets related to this technology. Which of the following will help the CIO identify potential dangers related to the loss of this technology?
a. Threat assessment
b. Vulnerability assessment
c. Privacy threshold assessment
d. Privacy impact assessment
You are performing a risk assessment and you need to calculate the average expected loss of a incident. Which of the following value combinations would you MOST likely use?
a. ALE and ARO
b. ALE and SLE
c. SLE and ARO
d. ARO and ROI
ALE and ARO
You recently completed a vulnerability scan on your network. It reported that several servers are missing key operating system patches. However, after checking the servers, you've verified the servers have these patches installed. Which of the following BEST describes this?
a. False negative
b. Misconfiguration on servers
c. False positive
d. Non-credentialed scan
You want to identify all of the services running on a server. Which of the following tools is the BEST choice to meet this goal?
a. Penetration test
b. Protocol analyzer
d. Port scanner
Lisa needs to identify if a risk within a web application and identify potential misconfigurations on the server. However, she should passively test the security controls. Which of the following is the BEST choice to meet her needs?
a. Perform a penetration test
b. Perform a port scan
c. Perform a vulnerability scan
d. Perform traffic analysis with a sniffer
Perform a vulnerability scan
A network administrator needs to identify the type of traffic and packet flags used in traffic sent from a specific IP address. Which of the following is the BEST tool to meet this need?
c. Protocol analyzer
d. Vulnerability scan
Lisa has been hired as a penetration tester by your organization test the security of a web server. She wants to identify the operating system and get some information services and applications used by the server. Which of the following tools will BEST meet this need?
d. Gray box test
An organization wants to provide protection against malware attacks. Administrators have installed antivirus software on all computers. Additionally, they implemented a firewall and an IDS on the network. Which of the following BEST identifies this principle?
a. Implicit deny
b. Layered security
c. Least privilege
d. Flood guard
A security professional needs to identify a physical security control that will identify and authenticate individuals before allowing them to pass, and restrict passage to only a single person at a time. What should the professional recommend?
b. Smart cards
Your company's web site experiences a large number of client requests during certain times of the year. What could your company add to ensure the web site's availability during these times?
a. Fail-open cluster
c. Web application firewall
d. Load balancing
Which of the following is the LOWEST cost solution for fault tolerance?
a. Load balancing
b. Round-robin scheduling
d. Warm site
Employees access a secure area by entering a cipher code, but this code does not identify individuals. After a recent security incident, management has decided to implement a key card system that will identify individuals who enter and exit this secure area. However, the installation might take six months or longer. Which of the following choices can the organization install immediately to identify individuals who enter or exit the secure area?
b. Access list
An organization has decided to increase the amount of customer data is maintains and use it for targeted sales. The privacy officer has determined that this data is PII. Which type of assessment should be completed to ensure the organization is complying with applicable laws and regulations related to this data?
a. Privacy impact assessment
b. Privacy threshold assessment
c. Threat assessment
d. Supply chain assessment
Privacy impact assessment
A security technician runs an automated script every night designed to detect changes in files. Of the following choices, what are the MOST LIKELY protocols used in this script?
a. PGP and SHA
b. ECC and HMAC
c. AES and Twofish
d. SHA and HMAC
SHA and HMAC
An application requires users to log on with passwords. The application developers want to store the passwords in such a way that it will thwart rainbow table attacks. Which of the following is the BEST solution?
Which of the following cryptography concepts indicates that ciphertext is significantly different than plaintext after it has been encrypted?
Your organization is investigating possible methods of sharing encryption keys overs a public network. Which of the following is the BEST choice?
An application developer is working on the cryptographic elements of an application. She needs to implement an encryption algorithm that provides both confidentiality and data authenticity. Which of the following cipher mods supports these goals?
An organization hosts several web servers in a web farm used to e-commerce. Due to recent attacks, management is concerned that attackers might try to redirect web site traffic, allowing the attackers to impersonate their e-commerce site. Which of the following methods will address this issue?
b. Perfect forward secrecy
d. Key stretching
Users within an organization frequently access public web servers using HTTPS. Management wants to ensure that users can verify that certificates are valid even if the public CAs are temporarily unavailable. Which of the following should be implemented to meet this need?
c. Private CA
A security auditor discovered that several employees in the Accounting department can print and sign checks. In her final report, she recommended restricting the number of people who can print checks and the number of people who can sign them. She also recommended that no one should be authorized to print and sign checks. Which security policy does this describe?
a. Discretionary access control
b. Rule-based access control
c. Separation of duties
d. Job rotation
Separation of duties
Your organization includes a software development division within the IT department. One developer write and maintains applications for the Payroll department. Once a year, they have to switch roles for at least a month. What is the purpose of this practice?
a. To enforce a separation of duties policy
b. To enforce a mandatory vacation policy
c. To enforce a job rotation policy
d. To enforce an acceptable use policy
To enforce a job rotation policy
Your organization is considering storage of sensitive data with a cloud provider. Your organization wants to ensure the data is encrypted while at rest and while in transit. Which type of interoperability agreement can your organization use to ensure the data is encrypted while in transit?
You work as a help-desk professional in a large organization. You have begun to receive an extraordinary number of calls from employees related to malware. Using common incident response procedures, what should be your FIRST response?
An incident response team is following typical incident response procedures. What phase is the BEST choice for analyzing an incident with a goal of identifying steps to prevent a reoccurrence of the incident?
You are helping your organization create a security policy for incident response. Which of the following choices is the BEST choice to include when an incident requires confiscation of a physical asset?
a. Ensure hashes are taken first
b. Ensure witness sign an AUP
c. Maintain the order of volatility
d. Keep a record of everyone who took possession of the physical asset
Keep a record of everyone who took possession of the physical asset
Security personnel confiscated a user's workstation after a security incident. Administrators removed the hard drive for forensic analysis, but left it unattended for several hours before capturing an image. Which of the following could prevent the company from taking the employee to court over this incident?
a. Witnesses were not identified
b. A chain of custody was not maintained
c. An order of volatility was not maintained
d. A hard drive analysis was not complete
A chain of custody was not maintained
YOU MIGHT ALSO LIKE...
182 Security + Final Exam
Sec+ Study Questions (Darril Gibson)
Sec+ Study Questions (Darril Gibson)
CTS2120: COMP & NETWORK SECURITY
OTHER SETS BY THIS CREATOR
CompTIA Linux+ LX0-104 Flashcards
CompTIA Linux+ LX0-103 Flashcards