CompTIA Security+ 試験
Question No : 1
Audit logs from a small company's vulnerability scanning software show the following findings:
-Server001- Internal human resources payroll server
-Server101- Internet-facing web server
-Server201- SQL server for Server101
-Server301- Jumpbox used by systems administrators accessible from the internal network
Validated vulnerabilities found:
-Server001- Vulnerable to buffer overflow exploit that may allow attackers to install software -
Server101- Vulnerable to buffer overflow exploit that may allow attackers to install software -
Server201- OS updates not fully current
-Server301- Accessible from internal network without the use of jumpbox
-Server301- Vulnerable to highly publicized exploit that can elevate user privileges
Assuming external attackers who are gaining unauthorized information are of the highest concern, which of the following servers should be addressed FIRST?
Question No : 2
A workstation puts out a network request to locate another system. Joe, a hacker on the network,
responds before the real system does, and he tricks the workstation into communicating with him.
Which of the following BEST describes what occurred?
Question No : 3
A security analyst receives an alert from a WAF with the following payload:
var data= "<test test test>" ++ <../../../../../../etc/passwd>"
Which of the following types of attacks is this?
Question No : 4
Which of the following cryptographic algorithms is irreversible?
Question No : 5
Which of the following types of attacks precedes the installation of a rootkit on a server?
Question No : 6
A security administrator is configuring a new network segment, which contains devices that will be accessed by external users, such as web and FTP server.
Which of the following represents the MOST secure way to configure the new network segment?
Question No : 7
To reduce disk consumption, an organization's legal department has recently approved a new policy setting the data retention period for sent email at six months.
Which of the following is the
BEST way to ensure this goal is met?
Question No : 8
A director of IR is reviewing a report regarding several recent breaches. The director compiles the following statistic's
- Initial IR engagement time frame
- Length of time before an executive management notice went out
- Average IR phase completion
The director wants to use the data to shorten the response time.
Which of the following would accomplish this?
Question No : 9
Joe, a user, wants to send Ann, another user, a confidential document electronically.
Which of the following should Joe do to ensure the document is protected from eavesdropping?
Question No : 10
An organization uses SSO authentication for employee access to network resources. When an employee resigns, as per the organization's security policy, the employee's access to all network resources is terminated immediately. Two weeks later, the former employee sends an email to the help desk for a password reset to access payroll information from the human resources server.
Which of the following represents the BEST course of action?
Question No : 11
A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the
Internet. The firm informs the company that an exploit exists for an FTP server that had a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists form the vendor.
Which of the following BEST describes the reason why the vulnerability exists?
Question No : 12
A Chief Executive Officer (CEO) suspects someone in the lab testing environment is stealing confidential information after working hours when no one else is around.
Which of the following actions can help to prevent this specific threat?
Question No : 13
A development team has adopted a new approach to projects in which feedback is iterative and multiple iterations of deployments are provided within an application's full life cycle.
Which of the following software development methodologies is the development team using?
Question No : 14
A black hat hacker is enumerating a network and wants to remain convert during the process.
The hacker initiates a vulnerability scan. Given the task at hand the requirement of being convert,
which of the following statements BEST indicates that the vulnerability scan meets these requirements?
Question No : 15
An in-house penetration tester is using a packet capture device to listen in on network communications.
This is an example of: