Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






2. Which of the following are the default ports for HTTP and HTTPS protocols?






3. Which of the following is used when performing a quantitative risk analysis?






4. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






5. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






6. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?






7. Which of the following is the primary difference between a virus and a worm?






8. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






9. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces






10. Which of the following identifies some of the running services on a system?






11. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






12. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?






13. Which of the following BEST describes an intrusion prevention system?






14. Which of the following is the BEST way to secure data for the purpose of retention?






15. Risk can be managed in the following ways...






16. MAC filtering is a form of which of the following?






17. Which of the following threats corresponds with an attacker targeting specific employees of a company?






18. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






19. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






20. Webmail is classified under which of the following cloud-based technologies?






21. Which of the following is the BEST choice for encryption on a wireless network?






22. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?






23. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






24. Which of the following encryption algorithms can be used in PGP for data encryption?






25. Which of the following should a security administrator implement to prevent users from disrupting network connectivity if a user connects both ends of a network cable to different switch ports?






26. Which of the following assists in identifying if a system was properly handled during transport?






27. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






28. Which of the following security threats does shredding mitigate?






29. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?






30. The 802.11i standard specifies support for which encryption algorithms?






31. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin






32. On-going annual awareness security training should be coupled with:..






33. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






34. Which of the following is the MOST secure method of utilizing FTP?






35. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?






36. What is the advantage of using application virtualization?






37. Which of the following access control models allows classification and labeling of objects?






38. Separating of duties is valuable in deterring?






39. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






40. Which of the following BEST describes the proper method and reason to implement port security?






41. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






42. Which of the following is a security control that is lost when using cloud computing?






43. Which of the following describes a passive attempt to identify weaknesses?






44. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






45. Which of the following protocols requires the use of a CA based authentication process?






46. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






47. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






48. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?






49. Which of the following is a best practice when securing a switch from physical access?






50. Which of the following would need to be configured correctly to allow remote access to the network?