Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






2. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?






3. Which of the following protocols is often used in combination with L2TP to add an additional layer of security?






4. What types of encryption are used for adding a digital signature to a message?






5. Due to sensitive data concerns a security administrator has enacted a policy preventing the use of flash drives. Additionally - which of the following can the administrator implement to reduce the risk of data leakage?






6. Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?






7. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






8. Which of the following is true regarding the WTLS protocol?






9. Which of the following should NOT be used with username/password authentication?






10. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi






11. Which of the following is the BEST way to secure data for the purpose of retention?






12. A security administrator wants to know which systems are more susceptible to an attack compared to other systems on the network. Which of the following assessment tools would be MOST effective?






13. A system administrator could have a user level account and an administrator account to prevent:...






14. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






15. Which of the following encryption algorithms can be used in PGP for data encryption?






16. Applying detailed instructions to manage the including allowing or denying traffic based on port - protocol - address - or direction is an implementation of which of the following?






17. An administrator is taking an image of a server and converting it to a virtual instance. Which of the following BEST describes the information security requirements of a virtualized server?






18. Based on logs from file servers remote access systems - and IDS - a malicious insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss - but the insider's lawyer insis






19. Which of the following malicious code will do its objectionable deed after a predetermined action takes place or at a specific time?






20. What port does the Domain Name Service (DNS) use by default?






21. By default which of the following stops network traffic when the traffic is not identified in the firewall ruleset?






22. What principle requires that for a particular set of transactions - no one individual is solely responsible or allowed to execute the complete set?






23. An administrator is updating firmware on routers throughout the company. Where should the administrator document this work?






24. Which of the following BEST describes an intrusion prevention system?






25. Which of the following is a best practice when securing a switch from physical access?






26. Which of the following is the primary difference between a virus and a worm?






27. Separating of duties is valuable in deterring?






28. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






29. Which of the following is the default rule found in a corporate firewall's access control list?






30. Which of the following would need to be configured correctly to allow remote access to the network?






31. Which of the following includes a photo and can be used for identification?






32. You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment?






33. Which of the following is not an asymmetric system?






34. Which of the following access control models allows classification and labeling of objects?






35. Which of the following are the default ports for HTTP and HTTPS protocols?






36. Which of the following is a technique designed to obtain information from a specific person?






37. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






38. Which of the following should be installed to prevent employees from receiving unsolicited emails?






39. You are designing a Web-based application. You design the application so that it runs under a security context that allows only those privileges required for the application to run to minimize risk in the event of an attack. This is an example of whi






40. A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?






41. Which of the following uses TCP port 22 by default?






42. Which of the following facilitates computing for heavily utilized systems and networks?






43. Which of the following protocols requires the use of a CA based authentication process?






44. Which of the following MUST a programmer implement to prevent cross-site scripting?






45. Which of the following malware types is an antivirus scanner MOST unlikely to discover?






46. What asymmetric key is used to decrypt when using HTTPS?


47. Which of the following BEST explains the security benefit of a standardized server image?






48. Which of the following is the MAIN reason to require data labeling?






49. What asymmetric key is used to encrypt when using HTTPS?


50. A security administrator working for a health insurance company needs to protect customer data by installing an HVAC system and a mantrap in the data center. Which of the following are being addressed?