Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






2. With which of the following is RAID MOST concerned?






3. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






4. Which of the following describes a passive attempt to identify weaknesses?






5. Which of the following concepts ensures that the data is only viewable to authorized users?






6. Which of the following are the default ports for HTTP and HTTPS protocols?






7. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






8. Which of the following includes a photo and can be used for identification?






9. Which of the following is specific to a buffer overflow attack?






10. A system administrator could have a user level account and an administrator account to prevent:...






11. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?






12. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






13. MAC filtering is a form of which of the following?






14. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






15. Which of the following is used when performing a qualitative risk analysis?






16. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






17. Which of the following BEST describes the proper method and reason to implement port security?






18. Risk can be managed in the following ways...






19. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






20. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?






21. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






22. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?






23. Which of the following MUST a programmer implement to prevent cross-site scripting?






24. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






25. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






26. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






27. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






28. DRPs should contain which of the following?






29. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






30. Webmail is classified under which of the following cloud-based technologies?






31. The detection of a NOOP sled is an indication of which of the following attacks?






32. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur






33. Performing routine security audits is a form of which of the following controls?






34. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






35. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






36. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






37. Which of the following risks may result from improper use of social networking and P2P software?






38. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






39. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?






40. Which of the following is a detective security control?






41. Which of the following access control models allows classification and labeling of objects?






42. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






43. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






44. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






45. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?






46. Which of the following is a reason to perform user awareness and training?






47. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






48. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






49. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






50. Which of the following security threats does shredding mitigate?