Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






2. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






3. Performing routine security audits is a form of which of the following controls?






4. Separating of duties is valuable in deterring?






5. MAC filtering is a form of which of the following?






6. A targeted email attack sent to the company's Chief Executive Officer (CEO) is known as which of the following?






7. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






8. Which of the following facilitates computing for heavily utilized systems and networks?






9. You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?






10. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






11. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin






12. A security administrator needs to separate two departments. Which of the following would the administrator implement to perform this?






13. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?






14. Isolation mode on an AP provides which of the following functionality types?






15. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






16. A security firm has been engaged to assess a software application. A production-like test environment login details - production documentation and source code have been provided. Which of the following types of testing is being described?






17. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






18. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






19. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






20. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






21. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






22. Risk can be managed in the following ways...






23. You are performing risk assessment for an organization. What should you do during impact assessment?






24. Which of the following is NOT an application layer security protocol?






25. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur






26. Which of the following describes when forensic hashing should occur on a drive?






27. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






28. In which of the following locations would a forensic analyst look to find a hooked process?






29. Which of the following is MOST relevant to a buffer overflow attack?






30. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






31. Which of the following should be considered when trying to prevent somebody from capturing network traffic?






32. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?






33. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






34. In an 802.11n network which of the following provides the MOST secure method of both encryption and authorization?






35. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






36. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






37. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






38. Which of the following allows a security administrator to set device traps?






39. You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?






40. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






41. Which of the following manages peer authentication and key exchange for an IPSec connection?






42. Which of the following is a detective security control?






43. Which of the following uses TCP port 22 by default?






44. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






45. Which of the following MUST a programmer implement to prevent cross-site scripting?






46. Which of the following BEST describes an intrusion prevention system?






47. Which of the following devices is often used to cache and filter content?






48. Which of the following is not an asymmetric system?






49. Which of the following is a technique designed to obtain information from a specific person?






50. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?