Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






2. Which of the following is an unauthorized wireless router that allows access to a secure network?






3. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi






4. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?






5. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






6. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






7. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






8. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






9. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






10. Which of the following BEST describes the proper method and reason to implement port security?






11. DRPs should contain which of the following?






12. Which of the following devices would allow a technician to view IP headers on a data packet?






13. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces






14. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






15. Upper management decides which risk to mitigate based on cost. This is an example of:






16. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






17. Which of the following identifies some of the running services on a system?






18. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?






19. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






20. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?






21. Which environmental control is part of TEMPEST compliance?






22. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






23. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






24. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






25. Which of the following is MOST likely to be the last rule contained on any firewall?






26. Which of the following is the default rule found in a corporate firewall's access control list?






27. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






28. Which of the following is a technique designed to obtain information from a specific person?






29. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






30. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






31. Which of the following is the MOST secure method of utilizing FTP?






32. Which of the following is another name for a malicious attacker?






33. Which solution should you use?






34. Which of the following encryption algorithms can be used in PGP for data encryption?






35. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






36. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?






37. Which of the following security threats does shredding mitigate?






38. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






39. Which of the following should NOT be used with username/password authentication?






40. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






41. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. Used in conjunction which of the following are PII?






43. The 802.11i standard specifies support for which encryption algorithms?






44. What types of encryption are used for adding a digital signature to a message?






45. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






46. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






47. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






48. Which of the following uses TCP port 22 by default?






49. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






50. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests