Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






2. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






3. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






4. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






5. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






6. Which of the following is a detective security control?






7. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin






8. Which of the following is used when performing a qualitative risk analysis?






9. Which of the following BEST describes an intrusion prevention system?






10. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?






11. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






12. Which of the following devices is often used to cache and filter content?






13. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?






14. Which of the following can prevent an unauthorized employee from entering a data center?






15. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?






16. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






17. Which of the following facilitates computing for heavily utilized systems and networks?






18. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






19. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






20. Which of the following protocols requires the use of a CA based authentication process?






21. Which of the following risks may result from improper use of social networking and P2P software?






22. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






23. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






24. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?






25. Which of the following are accomplished when a message is digitally signed?






26. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






27. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






28. DRPs should contain which of the following?






29. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?






30. Which of the following is an unauthorized wireless router that allows access to a secure network?






31. Which of the following is used for exchanging secret keys over an insecure public network?






32. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






33. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






34. Which environmental control is part of TEMPEST compliance?






35. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






36. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






37. Which of the following should NOT be used with username/password authentication?






38. Which of the following assists in identifying if a system was properly handled during transport?






39. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?






40. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






41. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






42. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






43. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






44. You want to setup a secure method of sending and receiving email. Which two of the following protocols can be used for this purpose?






45. Which of the following is the BEST way to secure data for the purpose of retention?






46. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






47. Which of the following will provide the HIGHEST level of wireless network security?






48. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






49. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp






50. Which of the following should be considered when trying to prevent somebody from capturing network traffic?