Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is a technique designed to obtain information from a specific person?






2. Which of the following is a security control that is lost when using cloud computing?






3. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






4. Used in conjunction which of the following are PII?






5. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






6. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






7. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?






8. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






9. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






10. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






11. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






12. Which of the following describes when forensic hashing should occur on a drive?






13. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






14. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






15. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






16. Separating of duties is valuable in deterring?






17. Which of the following is an unauthorized wireless router that allows access to a secure network?






18. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






19. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






20. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






21. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal






22. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






23. What are typical elements of authentication as part of physical access controls?






24. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






25. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






26. Which of the following protocols requires the use of a CA based authentication process?






27. Which of the following BEST describes an intrusion prevention system?






28. You are performing risk assessment for an organization. What should you do during impact assessment?






29. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






30. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






31. What is the advantage of using application virtualization?






32. Which of the following risks may result from improper use of social networking and P2P software?






33. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?






34. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






35. MAC filtering is a form of which of the following?






36. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






37. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






38. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






39. Which of the following should be considered when trying to prevent somebody from capturing network traffic?






40. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?






41. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






42. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






43. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?






44. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






45. Which of the following devices would allow a technician to view IP headers on a data packet?






46. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?






47. Which of the following is true regarding the WTLS protocol?






48. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?






49. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






50. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests