Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






2. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






3. What allows for all activities on a network or system to be traced to the user who performed them?






4. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






5. Webmail is classified under which of the following cloud-based technologies?






6. Which of the following is a best practice when securing a switch from physical access?






7. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?






8. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of






9. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






10. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






11. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






12. Which of the following should NOT be used with username/password authentication?






13. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






14. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






15. On-going annual awareness security training should be coupled with:..






16. Which of the following uses TCP port 22 by default?






17. Which environmental control is part of TEMPEST compliance?






18. Isolation mode on an AP provides which of the following functionality types?






19. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






20. Which of the following authentication protocols utilizes the MD4 hashing algorithm?






21. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






22. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






23. Which of the following is MOST likely to be the last rule contained on any firewall?






24. Which of the following is the BEST choice for encryption on a wireless network?






25. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






26. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






27. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






28. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?






29. Which of the following protocols requires the use of a CA based authentication process?






30. Which of the following encryption algorithms can be used in PGP for data encryption?






31. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






32. Which of the following is NOT an application layer security protocol?






33. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






34. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






35. Which of the following is the BEST way to secure data for the purpose of retention?






36. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






37. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






38. Which of the following logical controls does a flood guard protect against?






39. Which of the following assists in identifying if a system was properly handled during transport?






40. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






41. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






42. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?






43. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






44. What asymmetric key is used to decrypt when using HTTPS?


45. MAC filtering is a form of which of the following?






46. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






47. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?






48. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






49. Which of the following is not an asymmetric system?






50. Which of the following threats corresponds with an attacker targeting specific employees of a company?