Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following devices would allow a technician to view IP headers on a data packet?






2. Which of the following are accomplished when a message is digitally signed?






3. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






4. Which environmental control is part of TEMPEST compliance?






5. On-going annual awareness security training should be coupled with:..






6. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?






7. With which of the following is RAID MOST concerned?






8. In which of the following locations would a forensic analyst look to find a hooked process?






9. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






10. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






11. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






12. Which of the following is a management control type?






13. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






14. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?






15. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






16. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






17. The detection of a NOOP sled is an indication of which of the following attacks?






18. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?






19. Which of the following MUST a programmer implement to prevent cross-site scripting?






20. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






21. Which of the following authentication protocols utilizes the MD4 hashing algorithm?






22. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






23. DRPs should contain which of the following?






24. What types of encryption are used for adding a digital signature to a message?






25. Upper management decides which risk to mitigate based on cost. This is an example of:






26. The 802.11i standard specifies support for which encryption algorithms?






27. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






28. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






29. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






30. Risk can be managed in the following ways...






31. Which of the following is used when performing a quantitative risk analysis?






32. Actively monitoring data streams in search of malicious code or behavior is an example of..






33. Which of the following uses TCP port 22 by default?






34. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






35. What are typical elements of authentication as part of physical access controls?






36. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






37. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?






38. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






39. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






40. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






41. A system administrator could have a user level account and an administrator account to prevent:...






42. Performing routine security audits is a form of which of the following controls?






43. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






44. Which of the following is the default rule found in a corporate firewall's access control list?






45. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






46. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






47. Which of the following is used for exchanging secret keys over an insecure public network?






48. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






49. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?






50. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?