Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What asymmetric key is used to encrypt when using HTTPS?


2. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






3. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






4. Which of the following devices is often used to cache and filter content?






5. Which of the following BEST describes the proper method and reason to implement port security?






6. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?






7. Which of the following logical controls does a flood guard protect against?






8. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






9. What types of encryption are used for adding a digital signature to a message?






10. Which of the following identifies some of the running services on a system?






11. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






12. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






13. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






14. The detection of a NOOP sled is an indication of which of the following attacks?






15. Which of the following is not an asymmetric system?






16. What port does the Domain Name Service (DNS) use by default?






17. Which of the following is NOT an application layer security protocol?






18. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






19. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






20. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






21. Which of the following describes a passive attempt to identify weaknesses?






22. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






23. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






24. Which of the following describes when forensic hashing should occur on a drive?






25. Which of the following would need to be configured correctly to allow remote access to the network?






26. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?






27. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






28. Which of the following is specific to a buffer overflow attack?






29. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






30. Which of the following is MOST commonly a part of routine system audits?






31. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






32. What asymmetric key is used to decrypt when using HTTPS?


33. Which of the following is used for exchanging secret keys over an insecure public network?






34. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






35. Upper management decides which risk to mitigate based on cost. This is an example of:






36. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






37. On-going annual awareness security training should be coupled with:..






38. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






39. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






40. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






41. Which of the following is true regarding the WTLS protocol?






42. Risk can be managed in the following ways...






43. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






44. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






45. With which of the following is RAID MOST concerned?






46. Which of the following is the default rule found in a corporate firewall's access control list?






47. Which solution should you use?






48. Which of the following should be enabled to ensure only certain wireless clients can access the network?






49. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






50. Which of the following is MOST relevant to a buffer overflow attack?