Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?






2. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






3. Which of the following describes when forensic hashing should occur on a drive?






4. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






5. Which of the following is the MAIN reason to require data labeling?






6. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






7. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?






8. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






9. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






10. A company needs to be able to prevent entry at all times - to a highly sensitive area inside a public building. In order to ensure the BEST type of physical security - which of the following should be implemented?






11. You installed a new e-commerce application on your web server that will allow your company to take orders from their website. You want to ensure that information that customers enter into their web browser is sent securely to the web server. Which of






12. Which of the following devices would allow a technician to view IP headers on a data packet?






13. NIDS can also be used to help identify...






14. What are typical elements of authentication as part of physical access controls?






15. Performing routine security audits is a form of which of the following controls?






16. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






17. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






18. Which of the following concepts ensures that the data is only viewable to authorized users?






19. An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?






20. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






21. Which of the following is a reason to perform user awareness and training?






22. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






23. MAC filtering is a form of which of the following?






24. Which of the following authentication protocols utilizes the MD4 hashing algorithm?






25. DRPs should contain which of the following?






26. Which of the following is another name for a malicious attacker?






27. Which of the following logical controls does a flood guard protect against?






28. You are performing risk assessment for an organization. What should you do during impact assessment?






29. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






30. Which of the following can prevent an unauthorized employee from entering a data center?






31. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






32. Which of the following includes a photo and can be used for identification?






33. Isolation mode on an AP provides which of the following functionality types?






34. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






35. A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?






36. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






37. Your company wants a new web server that can be accessed both by users on your internal network and by users on the Internet. You advice the company to locate the server behind the corporate firewall so it can enjoy similar protection as the internal






38. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces






39. Which of the following functions is MOST likely performed by a web security gateway?






40. Which of the following security threats does shredding mitigate?






41. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?






42. Which of the following assists in identifying if a system was properly handled during transport?






43. Used in conjunction which of the following are PII?






44. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






45. Which of the following identifies some of the running services on a system?






46. For which of the following is centralized key management most complicated?






47. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






48. What is the advantage of using application virtualization?






49. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






50. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to