Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?






2. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?






3. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






4. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






5. Which of the following is used for exchanging secret keys over an insecure public network?






6. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?






7. MAC filtering is a form of which of the following?






8. On-going annual awareness security training should be coupled with:..






9. What port does the Domain Name Service (DNS) use by default?






10. Which of the following is used when performing a quantitative risk analysis?






11. Which of the following BEST describes the proper method and reason to implement port security?






12. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






13. Which of the following should NOT be used with username/password authentication?






14. Which of the following uses TCP port 22 by default?






15. The 802.11i standard specifies support for which encryption algorithms?






16. Which of the following threats corresponds with an attacker targeting specific employees of a company?






17. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






18. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






19. Which of the following is a technique designed to obtain information from a specific person?






20. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






21. Which solution should you use?






22. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






23. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






24. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






25. Actively monitoring data streams in search of malicious code or behavior is an example of..






26. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






27. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






28. Which of the following MUST a programmer implement to prevent cross-site scripting?






29. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






30. Which of the following is MOST likely to be the last rule contained on any firewall?






31. Which of the following malware types is an antivirus scanner MOST unlikely to discover?






32. Which of the following concepts ensures that the data is only viewable to authorized users?






33. Which of the following describes a passive attempt to identify weaknesses?






34. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of






35. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?






36. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






37. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






38. What is the advantage of using application virtualization?






39. Which of the following is the MOST secure method of utilizing FTP?






40. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






41. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






42. Which of the following should be installed to prevent employees from receiving unsolicited emails?






43. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






44. Which of the following can prevent an unauthorized employee from entering a data center?






45. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






46. Which of the following devices would allow a technician to view IP headers on a data packet?






47. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in






48. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






49. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






50. Which of the following is a best practice to identify fraud from an employee in a sensitive position?