Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DRPs should contain which of the following?






2. Which of the following port numbers is used for SCP by default?






3. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






4. Which of the following reduces the likelihood of a single point of failure when a server fails?






5. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






6. Which of the following concepts ensures that the data is only viewable to authorized users?






7. Which of the following protocols requires the use of a CA based authentication process?






8. Which of the following BEST describes an intrusion prevention system?






9. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






10. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?






11. What types of encryption are used for adding a digital signature to a message?






12. Which of the following describes when forensic hashing should occur on a drive?






13. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






14. Which of the following access control models allows classification and labeling of objects?






15. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






16. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?






17. Separating of duties is valuable in deterring?






18. A company that purchases insurance to reduce risk is an example of which of the following?






19. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






20. Which of the following is MOST commonly a part of routine system audits?






21. Which of the following attacks would password masking help mitigate?






22. Which of the following security threats does shredding mitigate?






23. Which of the following threats corresponds with an attacker targeting specific employees of a company?






24. Which of the following is MOST likely to be the last rule contained on any firewall?






25. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin






26. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






27. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






28. Upper management decides which risk to mitigate based on cost. This is an example of:






29. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






30. Which of the following devices is often used to cache and filter content?






31. Which of the following is the primary difference between a virus and a worm?






32. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






33. Which of the following describes a passive attempt to identify weaknesses?






34. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?






35. Which environmental control is part of TEMPEST compliance?






36. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






37. Which of the following should be considered when trying to prevent somebody from capturing network traffic?






38. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






39. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






40. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






41. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






42. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






43. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






44. The 802.11i standard specifies support for which encryption algorithms?






45. Which of the following is a reason to perform user awareness and training?






46. Used in conjunction which of the following are PII?






47. What asymmetric key is used to decrypt when using HTTPS?


48. What is the advantage of using application virtualization?






49. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






50. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?