Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?






2. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






3. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






4. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






5. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






6. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?






7. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






8. Which of the following is a best practice when securing a switch from physical access?






9. Performing routine security audits is a form of which of the following controls?






10. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






11. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?






12. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






13. Which of the following is another name for a malicious attacker?






14. Which of the following is the BEST choice for encryption on a wireless network?






15. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






16. Which of the following devices is often used to cache and filter content?






17. Which solution should you use?






18. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces






19. Which of the following is true regarding the WTLS protocol?






20. Which of the following reduces the likelihood of a single point of failure when a server fails?






21. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






22. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?






23. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






24. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?






25. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






26. The detection of a NOOP sled is an indication of which of the following attacks?






27. What allows for all activities on a network or system to be traced to the user who performed them?






28. MAC filtering is a form of which of the following?






29. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






30. Which environmental control is part of TEMPEST compliance?






31. Which of the following risks may result from improper use of social networking and P2P software?






32. Which of the following is MOST likely to be the last rule contained on any firewall?






33. DRPs should contain which of the following?






34. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






35. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






36. Isolation mode on an AP provides which of the following functionality types?






37. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






38. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






39. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






40. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






41. Which of the following is a detective security control?






42. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






43. Separating of duties is valuable in deterring?






44. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






45. Which of the following functions is MOST likely performed by a web security gateway?






46. What asymmetric key is used to decrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


47. Which of the following BEST describes an intrusion prevention system?






48. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






49. Which of the following uses TCP port 22 by default?






50. Which of the following would need to be configured correctly to allow remote access to the network?