Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






2. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






3. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






4. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?






5. The detection of a NOOP sled is an indication of which of the following attacks?






6. Which of the following allows a security administrator to set device traps?






7. Which of the following is BEST used to prevent ARP poisoning attacks across a network?






8. Upper management decides which risk to mitigate based on cost. This is an example of:






9. Which of the following describes a passive attempt to identify weaknesses?






10. Which of the following will provide the HIGHEST level of wireless network security?






11. A system administrator could have a user level account and an administrator account to prevent:...






12. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?






13. MAC filtering is a form of which of the following?






14. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






15. Used in conjunction which of the following are PII?






16. What is the advantage of using application virtualization?






17. A company that purchases insurance to reduce risk is an example of which of the following?






18. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?






19. For which of the following is centralized key management most complicated?






20. Which of the following includes a photo and can be used for identification?






21. Which of the following is the BEST choice for encryption on a wireless network?






22. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin






23. Which of the following is a technique designed to obtain information from a specific person?






24. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal






25. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi






26. Which of the following is used when performing a quantitative risk analysis?






27. Which of the following BEST describes an intrusion prevention system?






28. Which of the following is NOT an application layer security protocol?






29. Which of the following can prevent an unauthorized employee from entering a data center?






30. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






31. Which of the following should be considered when trying to prevent somebody from capturing network traffic?






32. How does a NAT server help protect your network?






33. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






34. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






35. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.






36. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur






37. Which of the following BEST explains the security benefit of a standardized server image?






38. With which of the following is RAID MOST concerned?






39. Which of the following environmental variables reduces the potential for static discharges?






40. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






41. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






42. What asymmetric key is used to encrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


43. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






44. Risk can be managed in the following ways...






45. Which environmental control is part of TEMPEST compliance?






46. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des






47. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






48. Performing routine security audits is a form of which of the following controls?






49. Which of the following MUST a programmer implement to prevent cross-site scripting?






50. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?