Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






2. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






3. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






4. Which of the following are the default ports for HTTP and HTTPS protocols?






5. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






6. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






7. Which of the following BEST describes the proper method and reason to implement port security?






8. Which of the following is true concerning email message encryption by using S/MIME?






9. Which of the following encryption algorithms can be used in PGP for data encryption?






10. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?






11. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






12. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






13. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in






14. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?






15. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






16. Which of the following is the primary difference between a virus and a worm?






17. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






18. For which of the following is centralized key management most complicated?






19. What is the advantage of using application virtualization?






20. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?






21. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






22. Which of the following security threats does shredding mitigate?






23. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






24. Which of the following threats corresponds with an attacker targeting specific employees of a company?






25. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






26. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






27. What allows for all activities on a network or system to be traced to the user who performed them?






28. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






29. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur






30. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






31. Which of the following includes a photo and can be used for identification?






32. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?






33. With which of the following is RAID MOST concerned?






34. Which of the following is an unauthorized wireless router that allows access to a secure network?






35. Which of the following should be considered when trying to prevent somebody from capturing network traffic?






36. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






37. Risk can be managed in the following ways...






38. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?






39. Used in conjunction which of the following are PII?






40. Which of the following should be enabled to ensure only certain wireless clients can access the network?






41. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






42. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






43. Separating of duties is valuable in deterring?






44. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






45. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin






46. Which of the following is the MOST secure method of utilizing FTP?






47. Which of the following is another name for a malicious attacker?






48. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






49. Which of the following is specific to a buffer overflow attack?






50. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?