Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Webmail is classified under which of the following cloud-based technologies?






2. Which of the following is used for exchanging secret keys over an insecure public network?






3. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?






4. What port does the Domain Name Service (DNS) use by default?






5. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






6. Which of the following is a security control that is lost when using cloud computing?






7. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






8. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






9. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






10. Which of the following is a management control type?






11. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






12. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?






13. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






14. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






15. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






16. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






17. Which of the following authentication protocols utilizes the MD4 hashing algorithm?






18. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?






19. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?






20. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






21. Which of the following is MOST likely to be the last rule contained on any firewall?






22. Which of the following is the MAIN reason to require data labeling?






23. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






24. Which of the following MUST a programmer implement to prevent cross-site scripting?






25. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?






26. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






27. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






28. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






29. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






30. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






31. With which of the following is RAID MOST concerned?






32. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






33. What are typical elements of authentication as part of physical access controls?






34. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






35. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






36. Which of the following is the primary difference between a virus and a worm?






37. Which of the following describes a passive attempt to identify weaknesses?






38. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






39. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?






40. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






41. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






42. Which of the following assists in identifying if a system was properly handled during transport?






43. You are performing risk assessment for an organization. What should you do during impact assessment?






44. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.






45. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






46. How does a NAT server help protect your network?






47. What key is used to encrypt an HTTPS session?






48. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






49. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






50. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests