Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which environmental control is part of TEMPEST compliance?






2. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






3. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






4. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






5. Webmail is classified under which of the following cloud-based technologies?






6. Which of the following is NOT an application layer security protocol?






7. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?






8. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






9. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






10. What asymmetric key is used to encrypt when using HTTPS?


11. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






12. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






13. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






14. What are typical elements of authentication as part of physical access controls?






15. Which of the following should be installed to prevent employees from receiving unsolicited emails?






16. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?






17. Which of the following logical controls does a flood guard protect against?






18. Which of the following includes a photo and can be used for identification?






19. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






20. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






21. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?






22. What port does the Domain Name Service (DNS) use by default?






23. Used in conjunction which of the following are PII?






24. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






25. With which of the following is RAID MOST concerned?






26. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






27. Which of the following BEST explains the security benefit of a standardized server image?






28. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?






29. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






30. How does a NAT server help protect your network?






31. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?






32. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






33. In which of the following locations would a forensic analyst look to find a hooked process?






34. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






35. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






36. Which of the following is MOST likely to be the last rule contained on any firewall?






37. What key is used to encrypt an HTTPS session?






38. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






39. Which of the following is a technique designed to obtain information from a specific person?






40. Which of the following are the default ports for HTTP and HTTPS protocols?






41. MAC filtering is a form of which of the following?






42. Which of the following should be performed on a computer to protect the operating system from malicious software?






43. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






44. Which of the following BEST describes the proper method and reason to implement port security?






45. Which of the following manages peer authentication and key exchange for an IPSec connection?






46. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?






47. What is the advantage of using application virtualization?






48. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






49. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






50. Which of the following identifies some of the running services on a system?