Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. For which of the following is centralized key management most complicated?






2. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?






3. Which of the following are the default ports for HTTP and HTTPS protocols?






4. What port does the Domain Name Service (DNS) use by default?






5. Which of the following should NOT be used with username/password authentication?






6. A system administrator could have a user level account and an administrator account to prevent:...






7. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






8. Which of the following is MOST commonly a part of routine system audits?






9. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in






10. Which of the following describes when forensic hashing should occur on a drive?






11. Which of the following security threats does shredding mitigate?






12. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






13. Which of the following is used for exchanging secret keys over an insecure public network?






14. What asymmetric key is used to decrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


15. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?






16. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






17. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






18. Which of the following is not an asymmetric system?






19. What asymmetric key is used to encrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


20. What key is used to encrypt an HTTPS session?






21. In which of the following locations would a forensic analyst look to find a hooked process?






22. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






23. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






24. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?






25. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






26. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?






27. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?






28. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






29. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






30. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






31. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






32. Actively monitoring data streams in search of malicious code or behavior is an example of..






33. Which of the following risks may result from improper use of social networking and P2P software?






34. Which of the following should be considered when trying to prevent somebody from capturing network traffic?






35. With which of the following is RAID MOST concerned?






36. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






37. Risk can be managed in the following ways...






38. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






39. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






40. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






41. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






42. Which of the following will provide the HIGHEST level of wireless network security?






43. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






44. Which of the following is true concerning email message encryption by using S/MIME?






45. Which of the following environmental variables reduces the potential for static discharges?






46. Which of the following are accomplished when a message is digitally signed?






47. Which of the following protocols requires the use of a CA based authentication process?






48. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






49. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






50. Users in your company use a smart card and fingerprint scan to authenticate to the network. Which of the following authentication methods is used in your company?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests