Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is an unauthorized wireless router that allows access to a secure network?






2. Which of the following functions is MOST likely performed by a web security gateway?






3. Which of the following should be performed on a computer to protect the operating system from malicious software?






4. Which of the following threats corresponds with an attacker targeting specific employees of a company?






5. What is the advantage of using application virtualization?






6. Which of the following devices would allow a technician to view IP headers on a data packet?






7. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


8. Which of the following will provide the HIGHEST level of wireless network security?






9. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?






10. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?






11. What key is used to encrypt an HTTPS session?






12. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






13. Performing routine security audits is a form of which of the following controls?






14. Used in conjunction which of the following are PII?






15. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






16. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal






17. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






18. Which of the following is the default rule found in a corporate firewall's access control list?






19. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






20. Separating of duties is valuable in deterring?






21. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?






22. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






23. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






24. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?






25. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?






26. Which of the following logical controls does a flood guard protect against?






27. Which of the following is the BEST way to secure data for the purpose of retention?






28. Which of the following is BEST used to prevent ARP poisoning attacks across a network?






29. Which of the following is a best practice when securing a switch from physical access?






30. Which of the following manages peer authentication and key exchange for an IPSec connection?






31. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






32. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






33. Which of the following describes a passive attempt to identify weaknesses?






34. Which of the following facilitates computing for heavily utilized systems and networks?






35. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






36. What asymmetric key is used to encrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


37. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






38. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






39. What port does the Domain Name Service (DNS) use by default?






40. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






41. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






42. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






43. What allows for all activities on a network or system to be traced to the user who performed them?






44. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






45. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis






46. What are typical elements of authentication as part of physical access controls?






47. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






48. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






49. Which of the following is specific to a buffer overflow attack?






50. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?