Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






2. Which of the following encryption algorithms can be used in PGP for data encryption?






3. Which of the following is used when performing a qualitative risk analysis?






4. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






5. Which of the following is a security control that is lost when using cloud computing?






6. Which of the following BEST describes the proper method and reason to implement port security?






7. Which of the following is a method to prevent ad-hoc configuration mistakes?






8. Which of the following will provide the HIGHEST level of wireless network security?






9. Which of the following port numbers is used for SCP by default?






10. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






11. Which of the following is a best practice when securing a switch from physical access?






12. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






13. Which of the following protocols requires the use of a CA based authentication process?






14. Which of the following devices would allow a technician to view IP headers on a data packet?






15. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






16. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?






17. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






18. Which of the following logical controls does a flood guard protect against?






19. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






20. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






21. Which of the following is used when performing a quantitative risk analysis?






22. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






23. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?






24. Which of the following environmental variables reduces the potential for static discharges?






25. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






26. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






27. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






28. Separating of duties is valuable in deterring?






29. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






30. Which of the following includes a photo and can be used for identification?






31. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






32. What asymmetric key is used to encrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


33. Which of the following is MOST commonly a part of routine system audits?






34. Which of the following is another name for a malicious attacker?






35. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






36. Which of the following manages peer authentication and key exchange for an IPSec connection?






37. Which of the following can prevent an unauthorized employee from entering a data center?






38. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






39. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






40. Which of the following authentication protocols utilizes the MD4 hashing algorithm?






41. Which of the following is a technique designed to obtain information from a specific person?






42. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






43. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?






44. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?






45. MAC filtering is a form of which of the following?






46. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






47. Webmail is classified under which of the following cloud-based technologies?






48. Which of the following is the MAIN reason to require data labeling?






49. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






50. Which of the following describes a passive attempt to identify weaknesses?