Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What asymmetric key is used to encrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






3. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?






4. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?






5. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






6. You are performing risk assessment for an organization. What should you do during impact assessment?






7. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






8. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






9. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






10. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






11. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






12. Which of the following can prevent an unauthorized employee from entering a data center?






13. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






14. Which of the following should be performed on a computer to protect the operating system from malicious software?






15. Which of the following is the default rule found in a corporate firewall's access control list?






16. A system administrator could have a user level account and an administrator account to prevent:...






17. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?






18. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






19. Which of the following is the BEST choice for encryption on a wireless network?






20. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






21. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?






22. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






23. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






24. Which of the following is NOT an application layer security protocol?






25. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?






26. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






27. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






28. Used in conjunction which of the following are PII?






29. What allows for all activities on a network or system to be traced to the user who performed them?






30. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






31. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






32. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






33. For which of the following is centralized key management most complicated?






34. Which of the following devices is often used to cache and filter content?






35. Which of the following access control models allows classification and labeling of objects?






36. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






37. Which of the following is a best practice when securing a switch from physical access?






38. Which of the following risks may result from improper use of social networking and P2P software?






39. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






40. Which of the following is the BEST way to secure data for the purpose of retention?






41. Which environmental control is part of TEMPEST compliance?






42. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






43. In which of the following locations would a forensic analyst look to find a hooked process?






44. What port does the Domain Name Service (DNS) use by default?






45. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






46. What asymmetric key is used to decrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


47. Which of the following is specific to a buffer overflow attack?






48. Which of the following is true regarding the WTLS protocol?






49. Which of the following is used when performing a quantitative risk analysis?






50. Which of the following should be enabled to ensure only certain wireless clients can access the network?