Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?






2. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






3. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






4. What key is used to encrypt an HTTPS session?






5. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






6. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






7. Which of the following BEST describes the proper method and reason to implement port security?






8. Which of the following is MOST likely to be the last rule contained on any firewall?






9. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






10. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?






11. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






12. Which of the following is a detective security control?






13. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






14. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






15. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






16. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






17. Which of the following is the BEST choice for encryption on a wireless network?






18. Which of the following describes when forensic hashing should occur on a drive?






19. You are performing risk assessment for an organization. What should you do during impact assessment?






20. Which environmental control is part of TEMPEST compliance?






21. Which of the following manages peer authentication and key exchange for an IPSec connection?






22. NIDS can also be used to help identify...






23. Which of the following is a reason to perform user awareness and training?






24. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






25. A company that purchases insurance to reduce risk is an example of which of the following?






26. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






27. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






28. Which of the following protocols requires the use of a CA based authentication process?






29. Upper management decides which risk to mitigate based on cost. This is an example of:






30. The 802.11i standard specifies support for which encryption algorithms?






31. Which of the following is MOST relevant to a buffer overflow attack?






32. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






33. Which of the following would need to be configured correctly to allow remote access to the network?






34. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






35. Which of the following MUST a programmer implement to prevent cross-site scripting?






36. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






37. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






38. Performing routine security audits is a form of which of the following controls?






39. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






40. What are typical elements of authentication as part of physical access controls?






41. Which of the following should be considered when trying to prevent somebody from capturing network traffic?






42. Which of the following logical controls does a flood guard protect against?






43. Which of the following is true concerning email message encryption by using S/MIME?






44. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






45. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






46. Which of the following are the default ports for HTTP and HTTPS protocols?






47. Which of the following is the default rule found in a corporate firewall's access control list?






48. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






49. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






50. Which solution should you use?