Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which environmental control is part of TEMPEST compliance?






2. How does a NAT server help protect your network?






3. A company that purchases insurance to reduce risk is an example of which of the following?






4. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






5. What can you prevent when you deploy wireless devices inside a TEMPEST-certified building?






6. A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed. The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last m






7. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






8. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






9. A system administrator could have a user level account and an administrator account to prevent:...






10. Which of the following is MOST relevant to a buffer overflow attack?






11. A visitor plugs their laptop into the network and receives a warning about their antivirus being out of-date along with various patches that are missing. The visitor is unable to access the Internet or any network resources. Which of the following is






12. A security engineer is troubleshooting a server which cannot be reached from the Internet or the internal network. All other servers on the DMZ are able to communicate with this server. Which of the following is the MOST likely cause?






13. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






14. What is the advantage of using application virtualization?






15. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






16. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






17. Which of the following should NOT be used with username/password authentication?






18. Which of the following facilitates computing for heavily utilized systems and networks?






19. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






20. A bulk update process fails and writes incorrect data throughout the database. Which of the following concepts describes what has been compromised?






21. Performing routine security audits is a form of which of the following controls?






22. Which of the following is used when performing a qualitative risk analysis?






23. Which of the following concepts ensures that the data is only viewable to authorized users?






24. In which of the following locations would a forensic analyst look to find a hooked process?






25. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?






26. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






27. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






28. Webmail is classified under which of the following cloud-based technologies?






29. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






30. Separating of duties is valuable in deterring?






31. Which of the following assists in identifying if a system was properly handled during transport?






32. A rogue access point with the same SSID as the production wireless network is found. Which of the following BEST describes this attack?






33. Which of the following describes a passive attempt to identify weaknesses?






34. Which of the following environmental variables reduces the potential for static discharges?






35. Which of the following is true concerning email message encryption by using S/MIME?






36. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?






37. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






38. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






39. What asymmetric key is used to decrypt when using HTTPS?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


40. What types of encryption are used for adding a digital signature to a message?






41. A set of instructions normally implemented on a computer system as a procedure to manipulate data is called a(n)?






42. Which of the following risks may result from improper use of social networking and P2P software?






43. Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer?






44. Which of the following port numbers is used for SCP by default?






45. Which of the following is MOST likely to be the last rule contained on any firewall?






46. Which of the following includes a photo and can be used for identification?






47. Which of the following is used for exchanging secret keys over an insecure public network?






48. Which solution should you use?






49. On-going annual awareness security training should be coupled with:..






50. An administrator who wishes to block all database ports at the firewall should include which of the following ports in the block list?