What Is The Best Comptia Security+ Study Guide
96 questions across 0 topics. Use the find bar or section chips to jump to what you need.
A security administrator is implementing a security program that addresses confidentiality and availability. What else should the administrator include?
Ensure systems are not susceptible to unauthorized changes
You need to transmit PII via email and you want to maintain its confidentiality. What is the BEST solution?
Encrypt it before sending
Lisa manages network devices in your organization and maintains copies of the configuration filed for all the managed routers and switches. On a weekly basis, she creates hashes for these files and compares them with hashes she created on the same files the previous week. Which security goal is she pursuing?
Integrity
An organization wants to provide protection against malware attacks. Administrators have installed antivirus software on all computers. Additionally, they implemented a firewall and an IDS on the network. Which of the following BEST identifies this principal?
Layered security
Homer called into the help desk and says he forgot his password. Which of the following choices is the BEST choice for what the help-desk professional should do?
Reset the password and configure the password to expire after the first use.
Which type of authentication does a hardware token provide?
One-time password
Which type of authentication is a retina scan?
Biometric
Users are required to log on to their computers with a smart card and a PIN. Which BEST describes this?
Multifactor authentication
Your company recently began allowing workers to telecommute from home one or more days a week. However, your company doesn't currently have a remote access solution. They want to implement an AAA solution that supports different vendors. Which is the BEST choice?
RADIUS
Your organization has implemented a system that stores user credentials in a central database. Users log on once with their credentials. They can then access other systems in the organization without logging on again. What does this describe?
Single sign-on
Your organization issues users a variety of different mobile devices. However, management want to reduce potential data losses if the devices are lost or stolen. Which is the BEST technical control to achieve this goal?
Disk encryption
An outside security auditor recently completed an in-depth security audit on your network. One of the issues he reported was related to passwords. Specifically, he found the following passwords used on the network: Pa$$, 1@W2, and G7bT3. What should be change to avoid the problem shown with these passwords?
Mantrap
A recent security audit discovered several apparently dormant user accounts. Although users could log on to the accounts, no one had logged on to them for more than 60 days. You later discovered that these accounts are for contractors who work approximately one week every quarter. What is the BEST response to this situation?
Password length
Your organization routinely hires contractors to assist with different projects. Administrators are rarely notified when a project ends and contractors leave. Which is the BEST choice to ensure that contractors cannot log on with their account after they leave?
Disable the accounts
Developers are planning to develop an application using role-based access control. Which would they MOST likely include in their planning?
Enable account expiration
An organization has implemented an access control model that enforces permissions based on data labels assigned at different levels. What type of model is this?
A matrix of functions matched with their required priviliges
Which protocols use TCP port 22 by default?
MAC
Bart wants to block access to all external web sites. Which port should he block at the firewall?
SSH, SCP, SFTP
You need to manage a remote server. Which ports should you open on the firewall between your system and the remote server?
TCP 80
While reviewing logs on a firewall, you see several requests for the AAAA record of gcgapremium.com. What is the purpose of this request?
22 an 3389
Your organization has several switches used within the network. You need to implement a security control to secure the switch from physical access. What should you do?
To identify the IPv6 address of gcgapremium.com
You are configuring a switch and need to ensure that only authorized devices can connect to it and access the network through this switch. Which is the BEST choice to meet this goal?
Disable unused ports
You need to configure a UTM security appliance to restrict access to peer-to-peer file sharing web sites. What are you MOST likely to configure?
Implement 802.1x
Your organization has implemented a network design that allows internal computers to share one public IP address. What did they MOST likely implement?
URL Filter
What would you configure on a Layer 3 device to allow FTP traffic to pass through?
PAT
What type of device would have the following entries used to define its operation? permit IP any any eq 80 permit IP any any eq 443 deny IP any any
Access control list
You are preparing to deploy an anomaly-based detection system to monitor networks activity. What would you create first?
Firewall
A security company wants to gather intelligence about current methods attackers are using against its clients. What can it use?
Baseline
Lisa oversees and monitors processes at a water treatment plant using SCADA systems. Administrators recently discovered malware on her system that was connecting to the SCASA system. Although they removed the malware, management is still concerned. Lisa needs to continue using her system and it's not possible to update the SCADA system. What can mitigate the risk?
Honeynet
Your organization maintains a separate wireless network for visitors in a conference room. However, you have recently noticed that people are connecting to this network even when there aren't any visitors in the conference room. You want to prevent these connections, while maintaining easy access for visitors in the conference room. Which is the BEST solution?
Install a NIPS on the border of the SCADA network
Which represents the BEST action to increase security in a wireless network?
Reduce antenna power
Your organization is hosting a wireless network with an 802.1x server using PEAP. On Thursday, users report they can no longer access the wireless network. Administrators verified the network configuration matches the baseline, there aren't any hardware outages, and the wired network is operational. What is the MOST likely cause for the problem?
Replace TKIP with CCMP
You are planning a wireless network for a business. A core requirement is to ensure that the solution encrypts user credentials when users enter their usernames and passwords. What BEST meets this requirement?
The RADIUS server certificate expired.
A small business owner modified his wireless router with the following settings: PERMIT 1A:2B:3C:4D:5E:6F DENY 6F:5E:4D:3C:2B:1A After saving the settings, an employee reports that he cannot access the wireless network anymore. What is the MOST likely reason that the employee cannot access the network?
WPA2 over EAP-TTLS
Homer recently implemented a wireless network in his home using WEP. He asks you for advice. What is the BEST advice you can give him?
Hardware address filtering
What is an attack against a mobile device?
He should not use WEP because it implements weak IVs for encryption keys.
A network administrator needs to open a port on a firewall to support a VPN using PPTP. Which port should the administrator open?
Bluejacking
Attackers recently attacked a web server hosted by your organization. Management has tasked administrators with reducing the attack surface of this server to prevent future attacks. What will meet this goal?
TCP 1723
Network administrators identified what appears to be malicious traffic coming from an internal computer, but only when no one is logged on to the computer. You suspect the system is infected with malware. It periodically runs an application that attempts to connect to web sites over port 80 with Telnet. After comparing the computer with a list of services from the standard image, you verify this application is very likely the problem. What process allowed you to make this determination?
Identifying the baseline
An updated security policy defines what applications users can install and run on company-issued mobile devices. What technical controls will enforce this policy?
Baselining
You want to test new security controls before deploying them. What technologies provide the MOST flexibility to meet this goal?
Whitelisting
An organization recently suffered a significant outage after a technical installed an application update on a viral server during peak hours. The server remained down until administrators were able to install a previous version of the application on the server. What could the organization implement to prevent a reoccurrence of this problem?
Virtualization technologies
A security analyst is evaluation a critical industrial control system. The analyst wants to ensure the system has security controls to support availability. What will be BEST to meet this need?
Create a patch management policy
What are valid security controls for mobile devices?
Implementing control redundancy and diversity
A new mobile device security policy has authorized the use of employee-owned devices, but mandates additional security controls to protect them if devices are lost or stolen. What meets this goal?
Screen locks, device encryption, and remote wipe
You want to deter an attacker from using brute force to gain access to a mobile device. What would you configure?
Screen locks, and device encryption
Management within your company is considering allowing users to connect to the corporate network with their personally owned devices. What represents a security concern with this policy?
Account lockout settings
Your organization is planning to issue mobile devices to some employees, but management is concerned about protecting the confidentiality of data if the devices are lost or stolen. What is the BEST way to secure data at rest a mobile device?
Inability to ensure devices are up to date with current system patches
Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
Full device encryption
Management within your organization wants to limit documents copied to USB flash drives. What can be used to meet this goal?
TPM
Bart installed code designed to enable his account automatically, three days after anyone disables it. What does this describe?
DLP
Lisa recently completed an application used by the Personnel department to store PII and other employee information. She programmed in the ability to access this application with a username and password that only she knows, so that she can perform remote maintenance on the application if necessary. What does this describe?
Logic bomb
A recent change in an organization's security policy states that monitors need to be positioned so that the canoe be viewed from outside any windows. What is the purpose of this policy?
Backdoor
You are troubleshooting an intermittent connectivity issue with a web server. After examining the logs, You identify repeated connection attempts from various IP addresses. You realize these connection attempts are overloading the server, preventing it from responding to other connections. What is MOST likely occurring?
Reduce success of shoulder surfing
Your organization includes the following statement in the security policy: "Security controls need to protect against both online and offline password brute force attacks." Which controls are the LEAST helpful to meet these goals?
DDoS attack
A code review of a web application discovered that the application is not performing boundary checking. What should the web developer add to this application to resolve this issue?
Account expiration
A web developer is using methods to validate user input in a web site application. This insures the application isn't vulnerable to all of the following attack except one. What attacks are NOT prevented by validation user input?
Input validation
Checking the logs of a web server, you see the following entry: 198.252.69.129--[1/Sep/2013:05:20]"GET/index.php?username=ZZZZZZZZZZZZZZZZZZZZZZBBBBBBBBCCCCCCCHTTP/1.1""http://gcgapremium.com/security/""Chrome31" What is the BEST explanation to this entry?
Whaling
Looking at logs for an online web application, you see that someone has entered the following phrase into several queries: 'or'1'='1'-- What is the MOST likely explanation for this?
A buffer overflow attack
A security tester is using fuzzing techniques to test a software application. Which of the following does fuzzing use to test the application?
A SQL injection attack
An organization has purchased fire insurance to manage the risk of a potential fire. What methods are they using?
Unexpected input
You are asked to identify the number of times a specific type of incident occurs per year. Which of the following BEST identifies this?
Risk Transference
Lisa needs to calculate the total ALE for a group of servers used in the network. During the past two years, five of the servers failed. The hardware cost to replace each server is $3,500, and the downtime has resulted in $2,500 of additional loses. What is the ALE?
ARO
Security experts at your organization have determined that your network has been repeatedly attacked from multiple entities in a foreign country. Research indicated these are coordinated and sophisticated attacks. What BEST describes this activity?
$15,000
Bart is performing a vulnerability assessment. What BEST represents the goal of this task?
Advance persistent threat
You need to ensure that several systems have all appropriate security controls and patches. However, your supervisor specifically told you not to attack or compromise any of these systems. What is the BEST choice to meet these goals?
Identify the system's security posture
Which of the following tools is the MOST invasive type of testing?
Vulnerability scan
A security professional is testing the functionality of an application, but does not have any knowledge about the internal coding of the application. What type of test is this tester performing?
Pentest
Testers are analyzing a web application your organization is planning to deploy. They have full access to product documentation, including the code and date structures used by the application. What type of test will they MOST likely perform?
Black box
A network administrator is attempting to identify all traffic on an internal network. Which of the following tools is the BEST choice?
White box
Your organization's security policy requires that personnel notify security administrators if an incident occurs. However, this is not occurring consistently. What could the organization implement to ensure security administrators are notified in a timely manner?
Protocol analyzer
A security administrator is reviewing an organization's security policy and notices that the policy does not define a time frame for reviewing user rights and permissions. What is the MINIMUM time frame that she should recommend?
Routine auditing
Security personnel recently performed a security audit. They identified several employees who had permissions for previously held jobs within the Company. What should the organization implement to prevent this in the future?
At lease one year.
You are a technician at a small organization. You need to add fault-tolerance capabilities within the business to increase the availability of data. However, you need to keep costs as low as possible. What is the BEST choice to meet these needs?
Account management controls
An organization needs to identify a continuity of operations plan that will allow it to provide temporary IT support during a disaster. The organization does not want to have a dedicated site. What provides the best solution?
RAID-6
Monty Burns is the CEO of the Springfield Nuclear Power Plant. What would the company have in place in case something happens to him?
Mobile site
A continuity of operations plan for an organization includes the use of warm site. The BCP coordinator wants to verify that the organization's backup data center is prepared to implement the warm site if necessary. What is the BEST choice to meet this need?
Succession Planning
Users are complaining of intermittent connectivity issues. When you investigate, you discover that new network cables for these user systems were run across several fluorescent lights. What environmental control will resolve this issue?
Perform a disaster recovery exercise
A software company occasionally provides application updates and patches via its web site. It also provides a checksum for each update and patch. What BEST describes the purpose of the checksum?
EMI Shielding
A function converts data into a string of characters and the string of characters cannot be revers to re-create the original data. What type of function is this?
Integrity of updates and patches
Which of the following is a symmetric encryption algorithm that encrypts data one bit at a time?
Hashing
A supply company has several legacy systems connected together within a warehouse. And external security audit discovered the company is using DES and mandated the company upgrade DES to meet the minimum security requirements. The company plans to replace the legacy systems next year, but needs to meet the requirements from the audit. What is MOST likely to be the simplest upgrade for these systems?
Stream cipher
Network administrators in your organization need to administer firewalls, security appliances, and other network devices. These devices are protected with strong passwords, and passwords are stored in a file listing these passwords. What is the BEST choice to protect this password list?
3DES
Bart, an employee at your organization, is suspected of leaking data to a competitor. Investigations indicate he sent several email messages containing pictures of his dog. Investigators have not been able to identify and other suspicious activity. What is MOST likely occurring?
File encryption
You are planning to encrypt data in transit with IPsec. What is MOST likely to be used with IPsec?
Bart is leaking data using steganography
Bart wants to send a secure email to Lisa, so he decides to encrypt it. He wants to ensure that only Lisa can decrypt it. What does Lisa need to meet this requirement?
HMAC
An organization requests bids for a contact and asks companies to submit their bids via email. After winning the bid, Acme realized it couldn't meet the requirements of the contract. Acme instead stated that it never submitted the bid. What would provide proof to the organization that Acme did submit the bid?
Lisa's private key
Application developers are creating an application that requires users to log on with a strong passwords. The developers want to store the passwords in such a way that it will thwart brute force attacks. What is the BEST solution?
Digital signatures
A web site is using a certificate. Users have recently been receiving errors from the web site indicating that the web site's certificate is revoked. What includes a list of certificates that have been revoked?
PBKDF2
Which of the following is a management control?
OCSP
Security personnel recently identified potential fraud committed by a network administrator. Investigators discovered this administrator performs several job functions within the organization, including database administration and application development. What is the BEST solution to reduce risk associated with this activity?
Security policy
Security experts want to reduce risks associated with updating critical operating systems. What will BEST meet this goal?
Separation of Duties
Your company is considering implementing SSO capabilities to company applications and linking them to a social media site. When implemented, users can log on to Facebook and then access company applications without logging on again. What is a potential risk related to this plan?
Change management
You work as a help-desk professional in a large organization. You have begun to receive an extraordinary number of calls from employees related to malware. Using common incident response procedures, what should be your FIRST response?
A data breach exposing passwords on the social media site will affect the company application
A technician confiscated an employee's computer after management learned the employee had unauthorized material on his system. Later, a security expert captured a forensic image of the system disk. However, the security expert reported the computer was left unattended for several hours before he captured the image. What is a potential issue if this incident goes to court?
Identification
Social engineers have launched several successful phone-based attacks against your organization resulting in several data leaks. What would be the MOST effective at reducing the success of these attacks?
Chain of custody
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials