Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following MUST a programmer implement to prevent cross-site scripting?






2. Isolation mode on an AP provides which of the following functionality types?






3. Which of the following identifies some of the running services on a system?






4. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






5. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






6. Which of the following BEST describes the proper method and reason to implement port security?






7. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?






8. What port does the Domain Name Service (DNS) use by default?






9. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






10. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






11. What allows for all activities on a network or system to be traced to the user who performed them?






12. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






13. What is the advantage of using application virtualization?






14. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






15. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?






16. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






17. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






18. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






19. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






20. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






21. Which of the following uses TCP port 22 by default?






22. Which environmental control is part of TEMPEST compliance?






23. Which of the following should be considered when trying to prevent somebody from capturing network traffic?






24. The detection of a NOOP sled is an indication of which of the following attacks?






25. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






26. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?






27. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des






28. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






29. Which of the following should be enabled to ensure only certain wireless clients can access the network?






30. You are performing risk assessment for an organization. What should you do during impact assessment?






31. Which of the following includes a photo and can be used for identification?






32. Which of the following concepts ensures that the data is only viewable to authorized users?






33. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






34. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in






35. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






36. What types of encryption are used for adding a digital signature to a message?






37. Which of the following port numbers is used for SCP by default?






38. Which of the following is a method to prevent ad-hoc configuration mistakes?






39. Which of the following are the default ports for HTTP and HTTPS protocols?






40. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of






41. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?






42. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






43. Which of the following access control models allows classification and labeling of objects?






44. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp






45. Which of the following protocols requires the use of a CA based authentication process?






46. A system administrator could have a user level account and an administrator account to prevent:...






47. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






48. Which of the following is not an asymmetric system?






49. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






50. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests