Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






2. Which of the following is the BEST choice for encryption on a wireless network?






3. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






4. Which of the following is a best practice when securing a switch from physical access?






5. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?






6. Which of the following encryption algorithms can be used in PGP for data encryption?






7. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






8. Which of the following uses TCP port 22 by default?






9. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






10. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?






11. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






12. Which of the following will provide the HIGHEST level of wireless network security?






13. Which of the following describes a passive attempt to identify weaknesses?






14. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






15. A system administrator could have a user level account and an administrator account to prevent:...






16. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?






17. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






18. Actively monitoring data streams in search of malicious code or behavior is an example of..






19. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






20. Which of the following is MOST relevant to a buffer overflow attack?






21. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






22. Which of the following would need to be configured correctly to allow remote access to the network?






23. Which of the following is an unauthorized wireless router that allows access to a secure network?






24. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?






25. What port does the Domain Name Service (DNS) use by default?






26. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?






27. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?






28. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






29. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?






30. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






31. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






32. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






33. Which of the following is the primary difference between a virus and a worm?






34. Which of the following is MOST commonly a part of routine system audits?






35. The detection of a NOOP sled is an indication of which of the following attacks?






36. Which of the following should NOT be used with username/password authentication?






37. Which of the following is another name for a malicious attacker?






38. Which of the following attacks would password masking help mitigate?






39. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






40. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






41. Used in conjunction which of the following are PII?






42. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






43. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






44. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






45. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






46. Which of the following assists in identifying if a system was properly handled during transport?






47. Which of the following concepts ensures that the data is only viewable to authorized users?






48. Which of the following is used for exchanging secret keys over an insecure public network?






49. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






50. The 802.11i standard specifies support for which encryption algorithms?