Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are typical elements of authentication as part of physical access controls?






2. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






3. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






4. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






5. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?






6. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






7. You need to advise a new wiring system for a company with several locations partly open to the public. A primary requirement is to make tapping into the network as difficult as possible. Which of the following cable types should you advice?






8. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?






9. A system administrator could have a user level account and an administrator account to prevent:...






10. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






11. Which of the following is used when performing a qualitative risk analysis?






12. Which of the following are accomplished when a message is digitally signed?






13. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






14. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






15. Which of the following would need to be configured correctly to allow remote access to the network?






16. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






17. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






18. Which of the following devices is often used to cache and filter content?






19. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






20. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?






21. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






22. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






23. Which of the following should NOT be used with username/password authentication?






24. Which of the following describes a passive attempt to identify weaknesses?






25. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






26. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?






27. While browsing the Internet an administrator notices their browser behaves erratically - appears to download something - and then crashes. Upon restarting the PC - the administrator notices performance is extremely slow and there are hundreds of outb






28. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






29. A company that purchases insurance to reduce risk is an example of which of the following?






30. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






31. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






32. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?






33. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






34. Separating of duties is valuable in deterring?






35. Which environmental control is part of TEMPEST compliance?






36. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






37. For which of the following is centralized key management most complicated?






38. Which of the following is BEST used to prevent ARP poisoning attacks across a network?






39. In which of the following locations would a forensic analyst look to find a hooked process?






40. Which of the following risks may result from improper use of social networking and P2P software?






41. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






42. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






43. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des






44. Upper management decides which risk to mitigate based on cost. This is an example of:






45. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






46. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






47. Actively monitoring data streams in search of malicious code or behavior is an example of..






48. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






49. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






50. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests