Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following assists in identifying if a system was properly handled during transport?






2. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des






3. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






4. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






5. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






6. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






7. Which of the following should be considered when trying to prevent somebody from capturing network traffic?






8. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?






9. Webmail is classified under which of the following cloud-based technologies?






10. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






11. Which of the following is used for exchanging secret keys over an insecure public network?






12. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






13. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






14. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.






15. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?






16. Which of the following environmental variables reduces the potential for static discharges?






17. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






18. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?






19. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






20. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






21. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?






22. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?






23. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






24. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?






25. A company that purchases insurance to reduce risk is an example of which of the following?






26. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






27. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






28. Which of the following is a method to prevent ad-hoc configuration mistakes?






29. What allows for all activities on a network or system to be traced to the user who performed them?






30. Which of the following is MOST commonly a part of routine system audits?






31. Which of the following would need to be configured correctly to allow remote access to the network?






32. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






33. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






34. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






35. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?






36. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?






37. Which of the following is the MOST secure method of utilizing FTP?






38. Which of the following risks may result from improper use of social networking and P2P software?






39. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?






40. Which of the following threats corresponds with an attacker targeting specific employees of a company?






41. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






42. A system administrator could have a user level account and an administrator account to prevent:...






43. How does a NAT server help protect your network?






44. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


45. Which of the following is the MAIN reason to require data labeling?






46. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






47. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






48. Which of the following manages peer authentication and key exchange for an IPSec connection?






49. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






50. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?