Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following describes when forensic hashing should occur on a drive?






2. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






3. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






4. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






5. Which of the following is a technique designed to obtain information from a specific person?






6. Which of the following is NOT an application layer security protocol?






7. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?






8. The 802.11i standard specifies support for which encryption algorithms?






9. Which of the following are the default ports for HTTP and HTTPS protocols?






10. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






11. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






12. Which of the following should be enabled to ensure only certain wireless clients can access the network?






13. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






14. Which of the following devices is often used to cache and filter content?






15. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






16. MAC filtering is a form of which of the following?






17. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






18. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?






19. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






20. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






21. Which of the following reduces the likelihood of a single point of failure when a server fails?






22. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






23. Which of the following is a management control type?






24. Performing routine security audits is a form of which of the following controls?






25. Risk can be managed in the following ways...






26. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






27. Which of the following BEST describes the proper method and reason to implement port security?






28. Which of the following is used when performing a qualitative risk analysis?






29. Which of the following is not an asymmetric system?






30. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






31. On-going annual awareness security training should be coupled with:..






32. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?






33. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






34. Which of the following includes a photo and can be used for identification?






35. Which of the following is specific to a buffer overflow attack?






36. In which of the following locations would a forensic analyst look to find a hooked process?






37. Which of the following port numbers is used for SCP by default?






38. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?






39. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






40. A company that purchases insurance to reduce risk is an example of which of the following?






41. Which of the following is a reason to perform user awareness and training?






42. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






43. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?






44. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






45. Actively monitoring data streams in search of malicious code or behavior is an example of..






46. What key is used to encrypt an HTTPS session?






47. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






48. What port does the Domain Name Service (DNS) use by default?






49. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






50. Which of the following is BEST used to prevent ARP poisoning attacks across a network?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests