Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following will provide the HIGHEST level of wireless network security?






2. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






3. Which of the following environmental variables reduces the potential for static discharges?






4. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?






5. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






6. Which of the following includes a photo and can be used for identification?






7. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






8. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






9. Which of the following BEST describes the proper method and reason to implement port security?






10. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?


11. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






12. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






13. Which of the following is MOST commonly a part of routine system audits?






14. MAC filtering is a form of which of the following?






15. In which of the following locations would a forensic analyst look to find a hooked process?






16. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






17. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






18. Which of the following is a security control that is lost when using cloud computing?






19. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






20. Which environmental control is part of TEMPEST compliance?






21. DRPs should contain which of the following?






22. On-going annual awareness security training should be coupled with:..






23. Which of the following should be installed to prevent employees from receiving unsolicited emails?






24. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






25. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur






26. Which of the following assists in identifying if a system was properly handled during transport?






27. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






28. Which of the following would need to be configured correctly to allow remote access to the network?






29. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






30. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






31. Which of the following facilitates computing for heavily utilized systems and networks?






32. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






33. Which of the following is the primary difference between a virus and a worm?






34. Which of the following allows a security administrator to set device traps?






35. Which of the following MUST a programmer implement to prevent cross-site scripting?






36. Used in conjunction which of the following are PII?






37. What are typical elements of authentication as part of physical access controls?






38. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






39. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?






40. Which of the following manages peer authentication and key exchange for an IPSec connection?






41. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






42. Which of the following security threats does shredding mitigate?






43. What port does the Domain Name Service (DNS) use by default?






44. Which of the following describes when forensic hashing should occur on a drive?






45. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






46. Which of the following is used when performing a qualitative risk analysis?






47. Which of the following should NOT be used with username/password authentication?






48. With which of the following is RAID MOST concerned?






49. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






50. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?