Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following should be installed to prevent employees from receiving unsolicited emails?






2. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






3. Which of the following is MOST commonly a part of routine system audits?






4. What are typical elements of authentication as part of physical access controls?






5. On-going annual awareness security training should be coupled with:..






6. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






7. For which of the following is centralized key management most complicated?






8. Which of the following is true concerning email message encryption by using S/MIME?






9. Which of the following uses TCP port 22 by default?






10. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






11. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






12. What asymmetric key is used to decrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


13. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






14. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?






15. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






16. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






17. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






18. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






19. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






20. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






21. Which of the following BEST describes the proper method and reason to implement port security?






22. Which of the following is the MAIN reason to require data labeling?






23. Which of the following identifies some of the running services on a system?






24. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?






25. Which of the following malware types is an antivirus scanner MOST unlikely to discover?






26. Risk can be managed in the following ways...






27. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






28. How does a NAT server help protect your network?






29. Which of the following devices is often used to cache and filter content?






30. Which of the following is true regarding the WTLS protocol?






31. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






32. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






33. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






34. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






35. You are performing risk assessment for an organization. What should you do during impact assessment?






36. In which of the following locations would a forensic analyst look to find a hooked process?






37. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






38. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






39. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis






40. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






41. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






42. Which of the following includes a photo and can be used for identification?






43. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal






44. Which of the following protocols requires the use of a CA based authentication process?






45. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






46. Which of the following encryption algorithms can be used in PGP for data encryption?






47. Which of the following is the default rule found in a corporate firewall's access control list?






48. Which of the following is the primary difference between a virus and a worm?






49. Which of the following is the MOST secure method of utilizing FTP?






50. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?