Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following uses TCP port 22 by default?






2. Which of the following is NOT an application layer security protocol?






3. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






4. Which of the following is the MOST secure method of utilizing FTP?






5. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






6. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






7. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






8. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






9. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






10. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?






11. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi






12. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






13. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






14. With which of the following is RAID MOST concerned?






15. Which of the following is a management control type?






16. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp






17. Which of the following is specific to a buffer overflow attack?






18. What types of encryption are used for adding a digital signature to a message?






19. Which of the following devices would allow a technician to view IP headers on a data packet?






20. Which of the following port numbers is used for SCP by default?






21. Which of the following is a security control that is lost when using cloud computing?






22. Which of the following is used for exchanging secret keys over an insecure public network?






23. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






24. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?






25. How does a NAT server help protect your network?






26. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






27. Which of the following functions is MOST likely performed by a web security gateway?






28. Which of the following describes a passive attempt to identify weaknesses?






29. Which of the following should be performed on a computer to protect the operating system from malicious software?






30. Which of the following is MOST commonly a part of routine system audits?






31. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






32. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






33. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






34. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






35. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






36. Which of the following includes a photo and can be used for identification?






37. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






38. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






39. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






40. What are typical elements of authentication as part of physical access controls?






41. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?






42. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






43. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






44. Which of the following allows a security administrator to set device traps?






45. For which of the following is centralized key management most complicated?






46. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






47. Which of the following MUST a programmer implement to prevent cross-site scripting?






48. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






49. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






50. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests