Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






2. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in






3. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






4. Webmail is classified under which of the following cloud-based technologies?






5. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






6. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis






7. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?






8. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






9. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






10. Which of the following secure protocols is MOST commonly used to remotely administer Unix/Linux systems?






11. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






12. Which of the following concepts ensures that the data is only viewable to authorized users?






13. Which of the following is a method to prevent ad-hoc configuration mistakes?






14. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?






15. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






16. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.






17. Used in conjunction which of the following are PII?






18. A new enterprise solution is currently being evaluated due to its potential to increase the company's profit margins. The security administrator has been asked to review its security implications. While evaluating the various vulnerability scans were






19. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






20. Performing routine security audits is a form of which of the following controls?






21. Which of the following logical controls does a flood guard protect against?






22. Which of the following manages peer authentication and key exchange for an IPSec connection?






23. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






24. The detection of a NOOP sled is an indication of which of the following attacks?






25. Instead of giving a security administrator full the administrator is given rights only to review logs and update security related network devices. Additional rights are handed out to network administrators for the areas that fall within their job des






26. Network users whose computers are running Windows7 complain that the extra windows that appear when they browse the Internet are becoming a nuisance. You need to minimize how often these windows appear. What should you do?






27. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






28. Which of the following is BEST used to prevent ARP poisoning attacks across a network?






29. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






30. Which of the following protocols requires the use of a CA based authentication process?






31. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur






32. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






33. Which of the following is MOST likely to be the last rule contained on any firewall?






34. Which of the following includes a photo and can be used for identification?






35. Which of the following are accomplished when a message is digitally signed?






36. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






37. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






38. Which of the following BEST describes an intrusion prevention system?






39. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






40. What are typical elements of authentication as part of physical access controls?






41. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin






42. Which of the following is a technique designed to obtain information from a specific person?






43. Which of the following is a detective security control?






44. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






45. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?






46. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






47. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






48. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






49. Which of the following threats corresponds with an attacker targeting specific employees of a company?






50. The 802.11i standard specifies support for which encryption algorithms?