Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






2. Which of the following authentication protocols utilizes the MD4 hashing algorithm?






3. What is the advantage of using application virtualization?






4. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






5. Which of the following risks may result from improper use of social networking and P2P software?






6. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






7. Which of the following logical controls does a flood guard protect against?






8. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






9. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?






10. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?






11. Separating of duties is valuable in deterring?






12. The 802.11i standard specifies support for which encryption algorithms?






13. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






14. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






15. Which of the following is the BEST way to secure data for the purpose of retention?






16. Isolation mode on an AP provides which of the following functionality types?






17. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?






18. Which of the following is an unauthorized wireless router that allows access to a secure network?






19. Which of the following will provide the HIGHEST level of wireless network security?






20. Which of the following access control models allows classification and labeling of objects?






21. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






22. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






23. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






24. Which of the following is another name for a malicious attacker?






25. Which of the following BEST explains the security benefit of a standardized server image?






26. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






27. A company that purchases insurance to reduce risk is an example of which of the following?






28. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






29. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in






30. Which of the following is MOST relevant to a buffer overflow attack?






31. Which of the following can prevent an unauthorized employee from entering a data center?






32. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?






33. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






34. Which of the following reduces the likelihood of a single point of failure when a server fails?






35. A system administrator could have a user level account and an administrator account to prevent:...






36. Which of the following is a technique designed to obtain information from a specific person?






37. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






38. Which environmental control is part of TEMPEST compliance?






39. Which of the following devices is often used to cache and filter content?






40. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






41. Which of the following facilitates computing for heavily utilized systems and networks?






42. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?






43. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






44. Which of the following is MOST likely to be the last rule contained on any firewall?






45. Which of the following are accomplished when a message is digitally signed?






46. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






47. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






48. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






49. Performing routine security audits is a form of which of the following controls?






50. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?