Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is true concerning email message encryption by using S/MIME?






2. Which solution should you use?






3. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






4. Which of the following includes a photo and can be used for identification?






5. Which of the following are accomplished when a message is digitally signed?






6. Webmail is classified under which of the following cloud-based technologies?






7. Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?






8. Which of the following protocols requires the use of a CA based authentication process?






9. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






10. What asymmetric key is used to encrypt when using HTTPS?


11. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






12. Recovery Point Objectives and Recovery Time Objectives directly relate to which of the following BCP concepts?






13. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






14. Which of the following facilitates computing for heavily utilized systems and networks?






15. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






16. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






17. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi






18. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






19. Which of the following concepts ensures that the data is only viewable to authorized users?






20. The 802.11i standard specifies support for which encryption algorithms?






21. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?






22. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






23. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






24. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?






25. Which of the following devices would allow a technician to view IP headers on a data packet?






26. On-going annual awareness security training should be coupled with:..






27. Which of the following can prevent an unauthorized employee from entering a data center?






28. For which of the following is centralized key management most complicated?






29. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






30. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






31. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






32. Which of the following is the MOST secure method of utilizing FTP?






33. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






34. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






35. How does a NAT server help protect your network?






36. Which of the following is used when performing a quantitative risk analysis?






37. Which of the following is MOST relevant to a buffer overflow attack?






38. Which of the following BEST describes an intrusion prevention system?






39. Which of the following is a detective security control?






40. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






41. You are performing risk assessment for an organization. What should you do during impact assessment?






42. Which of the following functions is MOST likely performed by a web security gateway?






43. Which of the following security threats does shredding mitigate?






44. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






45. With which of the following is RAID MOST concerned?






46. Which of the following should NOT be used with username/password authentication?






47. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






48. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






49. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






50. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces