Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following should be installed to prevent employees from receiving unsolicited emails?






2. You are the network admin for a large LAN with a single - firewall-protected - Internet connection. You want to analyze all network traffic in your local network for suspicious activities and receive a notification when a possible attack is in proces






3. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






4. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






5. The detection of a NOOP sled is an indication of which of the following attacks?






6. Which of the following reduces the likelihood of a single point of failure when a server fails?






7. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






8. Which of the following logical controls does a flood guard protect against?






9. Which of the following manages peer authentication and key exchange for an IPSec connection?






10. Which of the following should be enabled to ensure only certain wireless clients can access the network?






11. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






12. A security administrator is in charge of a a hot site and a cold site. Due to a recent disaster - the administrator needs to ensure that their cold site is ready to go in case of a disaster. Which of the following does the administrator need to ensur






13. When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user. Which of the following BEST describes this type of attack?






14. Which of the following ports would a security administrator block if the administrator wanted to stop users from accessing outside SMTP services?






15. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






16. Which of the following should be performed on a computer to protect the operating system from malicious software?






17. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






18. What are typical elements of authentication as part of physical access controls?






19. A security administrator with full administrative rights on the network is forced to temporarily take time off of their duties. Which of the following describes this form of access control?






20. Which of the following protocols requires the use of a CA based authentication process?






21. Which of the following is another name for a malicious attacker?






22. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






23. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi






24. DRPs should contain which of the following?






25. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






26. A system administrator could have a user level account and an administrator account to prevent:...






27. Which of the following port numbers is used for SCP by default?






28. Which of the following is MOST relevant to a buffer overflow attack?






29. Which of the following includes a photo and can be used for identification?






30. What principle dictates that a user is given no more privilege necessary than that required to preform his/her job?






31. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






32. Which of the following are accomplished when a message is digitally signed?






33. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






34. Which of the following is NOT an application layer security protocol?






35. Which of the following is a management control type?






36. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






37. What is the name of the process during which an attacker gathers information about a target company's intranet - remote access - extranet - and Internet connections?






38. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






39. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






40. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






41. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






42. Which of the following can prevent an unauthorized employee from entering a data center?






43. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?






44. Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?






45. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






46. Which of the following devices would allow a technician to view IP headers on a data packet?






47. How does a NAT server help protect your network?






48. Which of the following cloud computing concepts is BEST described as providing an easy-to configure OS and on-demand computing for customers?






49. What port does the Domain Name Service (DNS) use by default?






50. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?