Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?






2. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






3. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






4. Which of the following is used for exchanging secret keys over an insecure public network?






5. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






6. Separating of duties is valuable in deterring?






7. Which of the following are accomplished when a message is digitally signed?






8. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






9. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






10. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






11. What are typical elements of authentication as part of physical access controls?






12. Which of the following includes a photo and can be used for identification?






13. A company that purchases insurance to reduce risk is an example of which of the following?






14. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






15. Which of the following will provide the HIGHEST level of wireless network security?






16. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






17. In which of the following locations would a forensic analyst look to find a hooked process?






18. Which of the following devices would allow a technician to view IP headers on a data packet?






19. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






20. Which of the following BEST describes the proper method and reason to implement port security?






21. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






22. Which of the following is the primary difference between a virus and a worm?






23. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






24. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






25. Which of the following is NOT an application layer security protocol?






26. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






27. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of






28. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






29. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






30. Which of the following is a technique designed to obtain information from a specific person?






31. Which of the following protocols requires the use of a CA based authentication process?






32. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






33. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






34. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






35. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur






36. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?






37. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?






38. Which of the following is the MAIN reason to require data labeling?






39. Which of the following is true concerning email message encryption by using S/MIME?






40. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






41. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






42. Which of the following is another name for a malicious attacker?






43. Which of the following is MOST likely to be the last rule contained on any firewall?






44. Which of the following malware types is an antivirus scanner MOST unlikely to discover?






45. Which of the following devices is often used to cache and filter content?






46. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






47. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






48. What allows for all activities on a network or system to be traced to the user who performed them?






49. Which of the following can prevent an unauthorized employee from entering a data center?






50. Which of the following attacks would password masking help mitigate?