Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The detection of a NOOP sled is an indication of which of the following attacks?






2. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?






3. Actively monitoring data streams in search of malicious code or behavior is an example of..






4. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






5. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






6. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






7. Which of the following attacks would password masking help mitigate?






8. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






9. Which of the following would need to be configured correctly to allow remote access to the network?






10. Which of the following is the BEST choice for encryption on a wireless network?






11. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






12. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






13. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






14. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






15. Which of the following logical controls does a flood guard protect against?






16. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis






17. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






18. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






19. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






20. Which of the following protocols requires the use of a CA based authentication process?






21. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






22. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?






23. Which of the following encryption algorithms can be used in PGP for data encryption?






24. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






25. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?






26. Which of the following is a detective security control?






27. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






28. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






30. Which of the following should NOT be used with username/password authentication?






31. Which of the following is a security control that is lost when using cloud computing?






32. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






33. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






34. Which of the following allows a security administrator to set device traps?






35. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp






36. Which of the following uses TCP port 22 by default?






37. Which of the following environmental variables reduces the potential for static discharges?






38. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of






39. Which of the following includes a photo and can be used for identification?






40. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






41. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






42. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






43. Which of the following is another name for a malicious attacker?






44. Which of the following is a best practice when securing a switch from physical access?






45. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






46. What key is used to encrypt an HTTPS session?






47. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?






48. Separating of duties is valuable in deterring?






49. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






50. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests