Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is a management control type?






2. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






3. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






4. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






5. Which of the following security threats does shredding mitigate?






6. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?






7. Which of the following describes when forensic hashing should occur on a drive?






8. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






9. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?






10. Which of the following is used for exchanging secret keys over an insecure public network?






11. Which of the following uses TCP port 22 by default?






12. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






13. Which of the following BEST describes an intrusion prevention system?






14. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






15. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






16. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






17. DRPs should contain which of the following?






18. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






19. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?






20. Which of the following MUST a programmer implement to prevent cross-site scripting?






21. Which of the following are accomplished when a message is digitally signed?






22. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


23. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des






24. Which environmental control is part of TEMPEST compliance?






25. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






26. Which of the following is not an asymmetric system?






27. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






28. With which of the following is RAID MOST concerned?






29. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?






30. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






31. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






32. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






33. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






34. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis






35. Which of the following is a security control that is lost when using cloud computing?






36. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






37. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






38. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?






39. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of






40. Which of the following would need to be configured correctly to allow remote access to the network?






41. Which of the following is the default rule found in a corporate firewall's access control list?






42. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






43. Which of the following is a technique designed to obtain information from a specific person?






44. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






45. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






46. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






47. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?






48. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






49. What types of encryption are used for adding a digital signature to a message?






50. NIDS can also be used to help identify...