Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is the BEST choice for encryption on a wireless network?






2. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






3. How does a NAT server help protect your network?






4. Which of the following is specific to a buffer overflow attack?






5. Which of the following would need to be configured correctly to allow remote access to the network?






6. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






7. What types of encryption are used for adding a digital signature to a message?






8. The detection of a NOOP sled is an indication of which of the following attacks?






9. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






10. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des






11. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






12. Which of the following port numbers is used for SCP by default?






13. Which of the following describes when forensic hashing should occur on a drive?






14. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






15. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






16. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?






17. What key is used to encrypt an HTTPS session?






18. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






19. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






20. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






21. Which of the following is used when performing a quantitative risk analysis?






22. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






23. On-going annual awareness security training should be coupled with:..






24. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?






25. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






26. Which of the following reduces the likelihood of a single point of failure when a server fails?






27. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






28. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






29. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






30. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?






31. Which of the following is a reason to perform user awareness and training?






32. Which of the following identifies some of the running services on a system?






33. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






34. Which of the following is true regarding the WTLS protocol?






35. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






36. In which of the following locations would a forensic analyst look to find a hooked process?






37. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






38. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






39. Risk can be managed in the following ways...






40. Which of the following are accomplished when a message is digitally signed?






41. Which of the following BEST describes the proper method and reason to implement port security?






42. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






43. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?






44. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?






45. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






46. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






47. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






48. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?






49. Which of the following BEST describes an intrusion prevention system?






50. A system administrator could have a user level account and an administrator account to prevent:...