Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is MOST likely to be the last rule contained on any firewall?






2. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






3. Which of the following is an unauthorized wireless router that allows access to a secure network?






4. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






5. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






6. Which of the following is MOST relevant to a buffer overflow attack?






7. Which of the following identifies some of the running services on a system?






8. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






9. Which of the following is BEST used to prevent ARP poisoning attacks across a network?






10. Which of the following authentication protocols utilizes the MD4 hashing algorithm?






11. Which of the following is true concerning email message encryption by using S/MIME?






12. What asymmetric key is used to decrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


13. Which of the following describes when forensic hashing should occur on a drive?






14. Which of the following is a technique designed to obtain information from a specific person?






15. Which of the following facilitates computing for heavily utilized systems and networks?






16. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






17. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






18. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






19. Performing routine security audits is a form of which of the following controls?






20. Which of the following is a security control that is lost when using cloud computing?






21. Used in conjunction which of the following are PII?






22. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






23. Which environmental control is part of TEMPEST compliance?






24. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






25. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






26. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?






27. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






28. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






29. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin






30. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






31. Which of the following is another name for a malicious attacker?






32. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?






33. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?






34. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






35. What asymmetric key is used to encrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


36. Which of the following is NOT an application layer security protocol?






37. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






38. Separating of duties is valuable in deterring?






39. Which of the following malware types is an antivirus scanner MOST unlikely to discover?






40. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






41. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






42. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






43. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






44. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






45. Which of the following would need to be configured correctly to allow remote access to the network?






46. A company that purchases insurance to reduce risk is an example of which of the following?






47. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






48. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






49. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?






50. What are typical elements of authentication as part of physical access controls?