Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






2. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






3. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






4. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






5. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






6. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






7. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






8. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






9. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






10. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






11. Which of the following is the primary difference between a virus and a worm?






12. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






13. Which of the following should be enabled to ensure only certain wireless clients can access the network?






14. Which of the following access control models allows classification and labeling of objects?






15. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






16. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






17. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of






18. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des






19. Which of the following security threats does shredding mitigate?






20. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






21. Which environmental control is part of TEMPEST compliance?






22. Which of the following is a reason to perform user awareness and training?






23. Which of the following includes a photo and can be used for identification?






24. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






25. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






26. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






27. Which of the following will provide the HIGHEST level of wireless network security?






28. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






29. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






30. What types of encryption are used for adding a digital signature to a message?






31. Which of the following malware types is an antivirus scanner MOST unlikely to discover?






32. Used in conjunction which of the following are PII?






33. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






34. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






35. Isolation mode on an AP provides which of the following functionality types?






36. Which of the following is a technique designed to obtain information from a specific person?






37. Risk can be managed in the following ways...






38. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






39. Which of the following should be considered when trying to prevent somebody from capturing network traffic?






40. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






41. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






42. With which of the following is RAID MOST concerned?






43. Which of the following can prevent an unauthorized employee from entering a data center?






44. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis






45. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






46. Upper management decides which risk to mitigate based on cost. This is an example of:






47. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?






48. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






49. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






50. Which of the following BEST explains the security benefit of a standardized server image?