Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following would need to be configured correctly to allow remote access to the network?






2. In which of the following locations would a forensic analyst look to find a hooked process?






3. Which of the following is a best practice when securing a switch from physical access?






4. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






5. The 802.11i standard specifies support for which encryption algorithms?






6. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis






7. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






8. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


9. Which solution should you use?






10. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






11. MAC filtering is a form of which of the following?






12. Which of the following encryption algorithms can be used in PGP for data encryption?






13. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






14. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






15. Which of the following should be considered when trying to prevent somebody from capturing network traffic?






16. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi






17. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






18. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






19. For which of the following is centralized key management most complicated?






20. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






21. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in






22. What port does the Domain Name Service (DNS) use by default?






23. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?






24. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?






25. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?






26. Which of the following is used when performing a qualitative risk analysis?






27. Which of the following is true concerning email message encryption by using S/MIME?






28. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






29. Which of the following is not an asymmetric system?






30. Which of the following BEST describes an intrusion prevention system?






31. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal






32. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






33. What asymmetric key is used to decrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


34. What are typical elements of authentication as part of physical access controls?






35. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?






36. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






37. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






38. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






39. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






40. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






41. Which of the following describes when forensic hashing should occur on a drive?






42. Which of the following devices would allow a technician to view IP headers on a data packet?






43. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






44. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?






45. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






46. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






47. Which of the following risks may result from improper use of social networking and P2P software?






48. Which environmental control is part of TEMPEST compliance?






49. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






50. Which of the following attacks would password masking help mitigate?