Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






2. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






3. Which of the following is specific to a buffer overflow attack?






4. Which of the following is used when performing a quantitative risk analysis?






5. Which of the following BEST describes the proper method and reason to implement port security?






6. Which of the following BEST explains the security benefit of a standardized server image?






7. Which of the following identifies some of the running services on a system?






8. Used in conjunction which of the following are PII?






9. Which of the following includes a photo and can be used for identification?






10. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






11. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?






12. Which of the following are the default ports for HTTP and HTTPS protocols?






13. Which environmental control is part of TEMPEST compliance?






14. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?






15. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






16. Which of the following devices would allow a technician to view IP headers on a data packet?






17. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin






18. Upper management decides which risk to mitigate based on cost. This is an example of:






19. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






20. Which of the following is MOST likely to be the last rule contained on any firewall?






21. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






22. Which of the following reduces the likelihood of a single point of failure when a server fails?






23. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






24. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






25. A system administrator could have a user level account and an administrator account to prevent:...






26. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






27. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






28. Which of the following is a reason to perform user awareness and training?






29. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






30. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






31. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






32. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






33. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






34. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






35. Which of the following attacks would password masking help mitigate?






36. Which of the following access control models allows classification and labeling of objects?






37. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






38. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






39. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






40. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






41. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






42. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






43. Which of the following will provide the HIGHEST level of wireless network security?






44. Which of the following should be enabled to ensure only certain wireless clients can access the network?






45. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






46. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






47. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?






48. What is the advantage of using application virtualization?






49. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






50. Which of the following is not an asymmetric system?