Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






2. Which of the following should be performed on a computer to protect the operating system from malicious software?






3. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






4. Which of the following includes a photo and can be used for identification?






5. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal






6. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin






7. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






8. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis






9. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






10. The detection of a NOOP sled is an indication of which of the following attacks?






11. Which of the following concepts ensures that the data is only viewable to authorized users?






12. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?






13. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?






14. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






15. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






16. Which of the following devices would allow a technician to view IP headers on a data packet?






17. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






18. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






19. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






20. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






21. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






22. Which of the following is MOST commonly a part of routine system audits?






23. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






24. Which of the following describes when forensic hashing should occur on a drive?






25. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?






26. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






27. Which of the following BEST describes the proper method and reason to implement port security?






28. Which of the following is the MOST secure method of utilizing FTP?






29. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






30. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?






31. Which of the following identifies some of the running services on a system?






32. Which of the following are accomplished when a message is digitally signed?






33. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?






34. Webmail is classified under which of the following cloud-based technologies?






35. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






36. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






37. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi






38. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






39. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






40. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






41. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






42. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






43. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






44. What key is used to encrypt an HTTPS session?






45. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






46. How does a NAT server help protect your network?






47. NIDS can also be used to help identify...






48. Which of the following is an unauthorized wireless router that allows access to a secure network?






49. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?






50. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?