Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is a detective security control?






2. Which of the following is another name for a malicious attacker?






3. Which of the following describes a passive attempt to identify weaknesses?






4. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur






5. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?






6. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






7. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






8. What port does the Domain Name Service (DNS) use by default?






9. Which of the following is MOST relevant to a buffer overflow attack?






10. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






11. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis






12. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?






13. Which of the following is the BEST way to secure data for the purpose of retention?






14. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






15. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






16. Which of the following should be performed on a computer to protect the operating system from malicious software?






17. Risk can be managed in the following ways...






18. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?






19. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?






20. Which of the following security threats does shredding mitigate?






21. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






22. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






23. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






24. Which of the following is not an asymmetric system?






25. Which of the following assists in identifying if a system was properly handled during transport?






26. Which solution should you use?






27. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






28. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






29. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






30. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






31. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






32. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






33. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






34. Which of the following is a technique designed to obtain information from a specific person?






35. Which of the following manages peer authentication and key exchange for an IPSec connection?






36. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?






37. Which of the following identifies some of the running services on a system?






38. A company that purchases insurance to reduce risk is an example of which of the following?






39. Which of the following is MOST likely to be the last rule contained on any firewall?






40. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






41. NIDS can also be used to help identify...






42. Which of the following threats corresponds with an attacker targeting specific employees of a company?






43. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






44. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of






45. Which environmental control is part of TEMPEST compliance?






46. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






47. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?






48. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






49. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






50. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?