Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






2. Which of the following devices would allow a technician to view IP headers on a data packet?






3. Which of the following is the BEST choice for encryption on a wireless network?






4. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






5. Which of the following assists in identifying if a system was properly handled during transport?






6. Which of the following devices is often used to cache and filter content?






7. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






8. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






9. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






10. Which of the following attacks would password masking help mitigate?






11. Which of the following is true concerning email message encryption by using S/MIME?






12. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






13. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






14. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?






15. Which of the following is specific to a buffer overflow attack?






16. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






17. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






18. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






19. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?






20. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






21. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






22. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?






23. Which of the following can prevent an unauthorized employee from entering a data center?






24. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






25. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






26. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






27. Used in conjunction which of the following are PII?






28. Which of the following is a detective security control?






29. Which of the following is MOST likely to be the last rule contained on any firewall?






30. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?






31. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






32. What types of encryption are used for adding a digital signature to a message?






33. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






34. Which of the following should be installed to prevent employees from receiving unsolicited emails?






35. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






36. Which of the following identifies some of the running services on a system?






37. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






38. Which of the following access control models allows classification and labeling of objects?






39. A company that purchases insurance to reduce risk is an example of which of the following?






40. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp






41. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






42. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






43. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






44. MAC filtering is a form of which of the following?






45. Which of the following should be performed on a computer to protect the operating system from malicious software?






46. What key is used to encrypt an HTTPS session?






47. Which environmental control is part of TEMPEST compliance?






48. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






49. Which of the following BEST describes the proper method and reason to implement port security?






50. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?