Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is another name for a malicious attacker?






2. On-going annual awareness security training should be coupled with:..






3. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






4. Which of the following security threats does shredding mitigate?






5. What key is used to encrypt an HTTPS session?






6. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des






7. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






8. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






9. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?






10. Which of the following threats corresponds with an attacker targeting specific employees of a company?






11. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






12. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






13. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






14. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?






15. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






16. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






17. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






18. Which of the following is used when performing a quantitative risk analysis?






19. Which of the following concepts ensures that the data is only viewable to authorized users?






20. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






21. Which of the following is specific to a buffer overflow attack?






22. Which of the following are the default ports for HTTP and HTTPS protocols?






23. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






24. Which of the following should be performed on a computer to protect the operating system from malicious software?






25. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?






26. Which of the following is true regarding the WTLS protocol?






27. Which of the following should be installed to prevent employees from receiving unsolicited emails?






28. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






29. MAC filtering is a form of which of the following?






30. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






31. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






32. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






33. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






34. Which of the following functions is MOST likely performed by a web security gateway?






35. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






36. What allows for all activities on a network or system to be traced to the user who performed them?






37. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






38. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






39. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






40. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.






41. Performing routine security audits is a form of which of the following controls?






42. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






43. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of






44. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






45. Which of the following is a detective security control?






46. Which of the following can prevent an unauthorized employee from entering a data center?






47. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?






48. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






49. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






50. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests