Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






2. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






3. Which of the following describes a passive attempt to identify weaknesses?






4. Which of the following is the BEST choice for encryption on a wireless network?






5. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






6. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






7. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






8. Which of the following is used when performing a qualitative risk analysis?






9. What key is used to encrypt an HTTPS session?






10. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?






11. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


12. Which of the following authentication protocols utilizes the MD4 hashing algorithm?






13. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






14. Which of the following are accomplished when a message is digitally signed?






15. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






16. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






17. Which of the following manages peer authentication and key exchange for an IPSec connection?






18. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






19. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






20. Which of the following functions is MOST likely performed by a web security gateway?






21. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces






22. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?






23. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






24. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






25. On-going annual awareness security training should be coupled with:..






26. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?






27. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?






28. What asymmetric key is used to decrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. Which of the following is true concerning email message encryption by using S/MIME?






30. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






31. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






32. Which of the following would need to be configured correctly to allow remote access to the network?






33. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






34. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi






35. Which of the following describes when forensic hashing should occur on a drive?






36. Which of the following port numbers is used for SCP by default?






37. Which of the following is a reason to perform user awareness and training?






38. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






39. What asymmetric key is used to encrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


40. Which of the following attacks would password masking help mitigate?






41. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?






42. A company that purchases insurance to reduce risk is an example of which of the following?






43. Which of the following concepts ensures that the data is only viewable to authorized users?






44. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






45. In which of the following locations would a forensic analyst look to find a hooked process?






46. Which of the following is true regarding the WTLS protocol?






47. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






48. Which of the following is used for exchanging secret keys over an insecure public network?






49. Which of the following should NOT be used with username/password authentication?






50. Which of the following is specific to a buffer overflow attack?