CompTIA Security+ Simulation 5

For each of the given items, select the appropriate authentication category from the drop down
choices.

Select the appropriate authentication type for the following items:

Correct Answer:


Something you are includes fingerprints, retina scans, or voice recognition.
Something you have includes smart cards, token devices, or keys.
Something you know includes a passwords, codes, PINs, combinations, or secret phrases.
Somewhere you are includes a physical location s or logical addresses, such as domain name, an
IP address, or a MAC address.
Something you do includes your typing rhythm, a secret handshake, or a private knock.

References:
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis

CompTIA Security+ Simulation 4

Select the appropriate attack from each drop down list to label the corresponding illustrated attack

Instructions: Attacks may only be used once, and will disappear from drop down list if selected. When you have completed the simulation, please select the Done button to submit.

Correct Answer:


1: Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. As with the e-mail messages used in regular phishing expeditions, spear phishing messages appear to come from a trusted source. Phishing messages usually appear to come from a large and well-known company or Web site with a broad membership base, such as eBay or PayPal. In the case of spear phishing, however, the apparent source of the e-mail is likely to be an individual within the recipient’s own company and generally someone in a position of authority.

2: The Hoax in this question is designed to make people believe that the fake AV (anti-virus) software is genuine.

3: Vishing is the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. The scammer usually pretends to be a legitimate business, and fools the victim into thinking he or she will profit.

4: Phishing is the act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

Phishing email will direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has. The website, however, is bogus and set up only to steal the information the user enters on the page.

5: Similar in nature to e-mail phishing, pharming seeks to obtain personal or private (usually financial related) information through domain spoofing. Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof Web sites which appear legitimate, pharming ‘poisons’ a DNS server by infusing false information into the DNS server, resulting in a user’s request being redirected elsewhere. Your browser, however will show you are at the correct Web site, which makes pharming a bit more serious and more difficult to detect. Phishing attempts to scam people one at a time with an e-mail while pharming allows the scammers to target large groups of people at one time through domain spoofing.

References:
http://searchsecurity.techtarget.com/definition/spear-phishing
http://www.webopedia.com/TERM/V/vishing.html
http://www.webopedia.com/TERM/P/phishing.html
http://www.webopedia.com/TERM/P/pharming.html

CompTIA Security+ Simulation 3

Drag and drop the correct protocol to its default port.

Correct Answer:


FTP uses TCP port 21.
Telnet uses port 23.
SSH uses TCP port 22.

All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22. Secure Copy Protocol (SCP) is a secure file-transfer facility based on SSH and Remote Copy Protocol (RCP). Secure FTP (SFTP) is a secured alternative to standard File Transfer Protocol (FTP).

SMTP uses TCP port 25.
Port 69 is used by TFTP.
SNMP makes use of UDP ports 161 and 162.

References:
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis

http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers

CompTIA Security+ Simulation 2

Determine the types of attacks below by selecting an option from the drop and drag list. Determine the types of Attacks from right to specific action.

Correct Answer:

CompTIA Security+ Simulation 1

DRAG DROP
You have been tasked with designing a security plan for your company. Drag and drop the appropriate security controls on the floor plan.

Instructions:All objects must be used and all place holders must be filled. Order does not matter. When you have completed the simulation, please select the Done button to submit.

Correct Answer:


1) Unsecured computer lab – Cable lock, proximity badges, biometric, CCTV, safe, cabinet lock
2) Office work place – safe, proximity, cable lock
3) Datacenter – biometric, proximity, mantrap, cipher lock
4) Offsite computer – cable lock, mantrap, CCTV

Cable locks – Adding a cable lock between a laptop and a desk prevents someone from picking it up and walking away Proximity badge + reader

Safe is a hardware/physical security measure

Mantrap can be used to control access to sensitive areas.

CCTV can be used as video surveillance.

Biometric reader can be used to control and prevent unauthorized access.

Locking cabinets can be used to protect backup media, documentation and other physical
artefacts.

References:
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,

CompTIA Network+ Simulation 13

You have been tasked with setting up a wireless network in an office. The network will consist of 3 access points and a single switch. The network must meet the following parameters.

The SSIDs need to be configured as corpnet with a key of S3cr3t! The wireless signals should not interfere with each other.

The subnet the Access points and Switch are on should only support 30 devices maximum The access Points should be configured to only support TKIP clients at a maximum speed

Instructions: Click on the devices to review their information and adjust the setting of the APs to meet the given requirements.

Correct Answer:

Exhibit 1 as follows
Access Point Name: AP1
IP Address: 192.168.1.3
Gateway: 192.168.1.2
SSID: corpnet
SSID Broadcast: yes
Mode: G
Channel: 1
Speed: Auto
Duplex: Auto
WPA Passphrase: S3cr3t!

Exhibit 2 as follows
Access Point Name: AP2
IP Address: 192.168.1.4
Gateway: 192.168.1.2
SSID: corpnet
SSID Broadcast: yes
Mode: G
Channel: 6
Speed: Auto
Duplex: Auto
WPA Passphrase: S3cr3t!

Exhibit 3 as follows
Access Point Name: AP3
IP Address: 192.168.1.5
Gateway: 192.168.1.2
SSID: corpnet
SSID Broadcast: yes
Mode: G
Channel: 11
Speed: Auto
Duplex: Auto
WPA Passphrase: S3cr3t!

CompTIA Network+ Simulation 12

You are tasked with creating a network that will accomplish the following requirements Requirements:
1) The remote sales team must be able to connect to the corporate network
2) Each department must have ONLY two PCs and a server
3) Each department must be segmented from each other
4) The following VLANs have been designated:
a) VLAN 2- Finance
b) VLAN 12- Sales
c) VLAN 22- Human Resources (HR)

Complete the network by dragging the required objects into the diagram.
INSTRUCTIONS: Objects can be used multiple times and not all placeholders need to be filled
Select and Place:

Correct Answer: