Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does a NAT server help protect your network?






2. Which of the following is used when performing a qualitative risk analysis?






3. Which of the following is not an asymmetric system?






4. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?






5. In which of the following locations would a forensic analyst look to find a hooked process?






6. Which of the following port numbers is used for SCP by default?






7. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






8. You are performing risk assessment for an organization. What should you do during impact assessment?






9. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






10. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






11. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






12. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?






13. Which of the following BEST describes an intrusion prevention system?






14. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?






15. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?






16. Which of the following is specific to a buffer overflow attack?






17. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






18. Which of the following is MOST relevant to a buffer overflow attack?






19. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in






20. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






21. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






22. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






23. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?






24. Which of the following is the MOST secure method of utilizing FTP?






25. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?






26. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






27. Performing routine security audits is a form of which of the following controls?






28. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






29. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






30. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






31. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






32. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?






33. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






34. The detection of a NOOP sled is an indication of which of the following attacks?






35. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






36. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






37. Which of the following environmental variables reduces the potential for static discharges?






38. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






39. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






40. Which of the following is the BEST choice for encryption on a wireless network?






41. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






42. A company that purchases insurance to reduce risk is an example of which of the following?






43. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


44. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






45. Which of the following threats corresponds with an attacker targeting specific employees of a company?






46. On-going annual awareness security training should be coupled with:..






47. Which of the following is true concerning email message encryption by using S/MIME?






48. What types of encryption are used for adding a digital signature to a message?






49. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






50. What asymmetric key is used to decrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183



Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests