Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.






2. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






3. Which of the following risks may result from improper use of social networking and P2P software?






4. Which of the following facilitates computing for heavily utilized systems and networks?






5. A security administrator performs several war driving routes each month and recently has noticed a certain area with a large number of unauthorized devices. Which of the following attack types is MOST likely occurring?






6. Which of the following are accomplished when a message is digitally signed?






7. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?






8. Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?






9. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






10. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






11. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






12. Which of the following environmental variables reduces the potential for static discharges?






13. What key is used to encrypt an HTTPS session?






14. Which of the following should be performed on a computer to protect the operating system from malicious software?






15. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp






16. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






17. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






18. Which of the following security threats does shredding mitigate?






19. A programmer allocates 16 bytes for a string but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to which of the following attacks?






20. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






21. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






22. Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control which of the following data types will be unavailable for later investigation?






23. In order to ensure high availability of all critical backups of the main data center are done in the middle of the night and then the backup tapes are taken to an offsite location. Which of the following would ensure the minimal amount of downtime in






24. Which of the following threats corresponds with an attacker targeting specific employees of a company?






25. DRPs should contain which of the following?






26. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






27. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






28. What is the term used to describe the type of attack where a DNS server accepts and uses incorrect information from a host that does not have authority to supply that information?






29. A user is no longer able to transfer files to the FTP server. The security administrator has verified the ports are open on the network firewall. Which of the following should the security administrator check?






30. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






31. User in your department complain about a slow Internet connection. You monitor the external interface of your company's border router and notice a huge mount of half-open TCP connections. What type of attack is your company currently a victim of?






32. Which environmental control is part of TEMPEST compliance?






33. Which of the following is the primary difference between a virus and a worm?






34. Which of the following is MOST commonly a part of routine system audits?






35. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






36. Which of the following describes when forensic hashing should occur on a drive?






37. Which of the following BEST describes an intrusion prevention system?






38. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






39. Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?






40. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?






41. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






42. Which of the following environmental controls would BEST be used to regulate cooling within a datacenter?






43. Which of the following is the MOST secure method of utilizing FTP?






44. Which of the following is a detective security control?






45. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






46. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?






47. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?






48. Which of the following are important physical security considerations when choosing a location for a new remote branch office?






49. Which of the following should be enabled to ensure only certain wireless clients can access the network?






50. Which of the following reduces the likelihood of a single point of failure when a server fails?