Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






2. Several staff members working in a datacenter have reported instances of tailgating. Which of the following could be implemented to prevent this security concern?






3. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






4. How a Trojan works: A user downloads a keygen to install pirated software. After running the keygen - system performance is ________________ are displayed.






5. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






6. A security administrator needs to implement a site-to-site VPN tunnel between the main office and a remote branch. Which of the following protocols should be used for the tunnel?






7. Which of the following should be enabled to ensure only certain wireless clients can access the network?






8. Which of the following is true concerning email message encryption by using S/MIME?






9. MAC filtering is a form of which of the following?






10. Upon investigation an administrator finds a suspicious system-level kernel module which modifies file system operations. This is an example of which of the following?






11. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






12. When configuring multiple computers for RDP on the same wireless router it may be necessary to do which of the following?






13. Which of the following is a detective security control?






14. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






15. Which of the following would provide the MOST reliable proof that a data center was accessed at a certain time of day?






16. DRPs should contain which of the following?






17. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






18. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






19. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






20. Which of the following attacks would password masking help mitigate?






21. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






22. Which of the following allows a security administrator to set device traps?






23. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis






24. Which of the following should be performed on a computer to protect the operating system from malicious software?






25. Which of the following BEST describes the proper method and reason to implement port security?






26. Which of the following is true regarding the WTLS protocol?






27. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






28. Which of the following is the BEST choice for encryption on a wireless network?






29. Which of the following environmental variables reduces the potential for static discharges?






30. Which of the following are the default ports for HTTP and HTTPS protocols?






31. Proper wireless antenna placement and radio power setting reduces the success of which of the following reconnaissance methods?






32. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






33. Which of the following is a security control that is lost when using cloud computing?






34. Which of the following attacks is NOT aimed at fragmentation vulnerabilities of the IP stack?






35. Which of the following is MOST relevant to a buffer overflow attack?






36. Which of the following functions is MOST likely performed by a web security gateway?






37. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






38. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?






39. An application log shows that the text 'test; rm -rf /etc/passwd' was entered into an HTML form. Which of the following describes the type of attack that was attempted?






40. With which of the following is RAID MOST concerned?






41. Which of the following is the BEST way to secure data for the purpose of retention?






42. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?






43. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






44. Which of the following encryption algorithms can be used in PGP for data encryption?






45. The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?






46. Which of the following is the MOST likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?






47. Which of the following is the MOST secure method of utilizing FTP?






48. Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?






49. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






50. Which of the following is MOST likely to be the last rule contained on any firewall?