Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?






2. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






3. Upper management decides which risk to mitigate based on cost. This is an example of:






4. Which of the following is the MOST secure method of utilizing FTP?






5. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






6. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


7. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






8. Which of the following is MOST commonly a part of routine system audits?






9. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur






10. Performing routine security audits is a form of which of the following controls?






11. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






12. Which of the following is a method to prevent ad-hoc configuration mistakes?






13. Which of the following is a management control type?






14. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






15. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






16. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






17. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






18. Which of the following is the primary difference between a virus and a worm?






19. You are performing risk assessment for an organization. What should you do during impact assessment?






20. Which of the following are the default ports for HTTP and HTTPS protocols?






21. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






22. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






23. Which of the following should be performed on a computer to protect the operating system from malicious software?






24. Which of the following is true regarding the WTLS protocol?






25. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






26. Which of the following is used for exchanging secret keys over an insecure public network?






27. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






28. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?






29. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






30. Which of the following devices is often used to cache and filter content?






31. What port does the Domain Name Service (DNS) use by default?






32. What key is used to encrypt an HTTPS session?






33. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?






34. Which of the following includes a photo and can be used for identification?






35. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






36. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






37. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






38. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des






39. What types of encryption are used for adding a digital signature to a message?






40. Which of the following is MOST likely to be the last rule contained on any firewall?






41. Which of the following should be installed to prevent employees from receiving unsolicited emails?






42. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






43. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?






44. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






45. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






46. What allows for all activities on a network or system to be traced to the user who performed them?






47. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






48. Which of the following authentication protocols utilizes the MD4 hashing algorithm?






49. How does a NAT server help protect your network?






50. Which of the following concepts ensures that the data is only viewable to authorized users?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests