Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is used for exchanging secret keys over an insecure public network?






2. Which of the following identifies some of the running services on a system?






3. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






4. Which of the following are accomplished when a message is digitally signed?






5. Which of the following is true concerning email message encryption by using S/MIME?






6. Which of the following devices would allow a technician to view IP headers on a data packet?






7. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






8. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






9. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






10. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






11. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






12. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






13. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






14. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






15. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






16. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






17. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






18. DRPs should contain which of the following?






19. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






20. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






21. Which of the following is a technique designed to obtain information from a specific person?






22. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?






23. Which of the following is a security control that is lost when using cloud computing?






24. Which of the following is the BEST way to secure data for the purpose of retention?






25. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






26. Performing routine security audits is a form of which of the following controls?






27. Which of the following describes a passive attempt to identify weaknesses?






28. Which of the following should NOT be used with username/password authentication?






29. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






30. Which of the following BEST describes the proper method and reason to implement port security?






31. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






32. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?






33. Upper management decides which risk to mitigate based on cost. This is an example of:






34. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






35. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






36. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






37. You are performing risk assessment for an organization. What should you do during impact assessment?






38. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






39. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






40. Actively monitoring data streams in search of malicious code or behavior is an example of..






41. On-going annual awareness security training should be coupled with:..






42. What are typical elements of authentication as part of physical access controls?






43. Which of the following is used when performing a quantitative risk analysis?






44. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






45. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






46. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






47. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






48. Which of the following is a reason to perform user awareness and training?






49. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






50. Which of the following is MOST relevant to a buffer overflow attack?