Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






2. Which of the following is BEST used to prevent ARP poisoning attacks across a network?






3. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






4. Which of the following access control models allows classification and labeling of objects?






5. Which of the following is MOST likely to be the last rule contained on any firewall?






6. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






7. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






8. What port does the Domain Name Service (DNS) use by default?






9. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?






10. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?






11. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?






12. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






13. Which of the following is the primary difference between a virus and a worm?






14. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






15. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?






16. With which of the following is RAID MOST concerned?






17. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






18. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






19. Which of the following BEST explains the security benefit of a standardized server image?






20. Which of the following devices would allow a technician to view IP headers on a data packet?






21. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






22. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?






23. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






24. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






25. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






26. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






27. Which of the following is an unauthorized wireless router that allows access to a secure network?






28. Which of the following describes when forensic hashing should occur on a drive?






29. Which of the following environmental variables reduces the potential for static discharges?






30. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






31. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






32. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






33. NIDS can also be used to help identify...






34. Which of the following should NOT be used with username/password authentication?






35. Which of the following is a management control type?






36. You are performing risk assessment for an organization. What should you do during impact assessment?






37. Which of the following is specific to a buffer overflow attack?






38. For which of the following is centralized key management most complicated?






39. Which of the following uses TCP port 22 by default?






40. Which of the following is a technique designed to obtain information from a specific person?






41. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






42. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?






43. In which of the following locations would a forensic analyst look to find a hooked process?






44. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?






45. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






46. Which of the following is a detective security control?






47. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






48. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






49. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






50. Which of the following attacks would password masking help mitigate?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests