Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?






2. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






3. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?






4. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






5. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






6. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






7. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






8. A system administrator could have a user level account and an administrator account to prevent:...






9. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






10. Which of the following functions is MOST likely performed by a web security gateway?






11. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






12. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






13. What is the advantage of using application virtualization?






14. Used in conjunction which of the following are PII?






15. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






16. Which of the following devices would allow a technician to view IP headers on a data packet?






17. Which of the following is the BEST choice for encryption on a wireless network?






18. Which of the following describes when forensic hashing should occur on a drive?






19. Risk can be managed in the following ways...






20. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






21. Which of the following is not an asymmetric system?






22. Webmail is classified under which of the following cloud-based technologies?






23. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






24. What are typical elements of authentication as part of physical access controls?






25. Which of the following is used for exchanging secret keys over an insecure public network?






26. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






27. Which of the following are accomplished when a message is digitally signed?






28. Which of the following describes a passive attempt to identify weaknesses?






29. Which of the following manages peer authentication and key exchange for an IPSec connection?






30. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






31. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






32. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






33. Which of the following should be enabled to ensure only certain wireless clients can access the network?






34. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






35. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?






36. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






37. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






38. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?






39. Which of the following is NOT an application layer security protocol?






40. Which solution should you use?






41. MAC filtering is a form of which of the following?






42. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces






43. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






44. The detection of a NOOP sled is an indication of which of the following attacks?






45. Which of the following is the default rule found in a corporate firewall's access control list?






46. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






47. Which of the following is MOST commonly a part of routine system audits?






48. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?






49. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






50. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests