Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technician needs to limit the wireless signal from reaching outside of a building. Which of the following actions should the technician take?






2. What fire suppression method should be used to extinguish an electrical fire in one of the racks in the server room?






3. Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to






4. Which of the following is true regarding the WTLS protocol?






5. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






6. What are typical elements of authentication as part of physical access controls?






7. Which of the following port numbers is used for SCP by default?






8. On-going annual awareness security training should be coupled with:..






9. NIDS can also be used to help identify...






10. Which of the following is a method to prevent ad-hoc configuration mistakes?






11. What is the advantage of using application virtualization?






12. The server log shows 25 SSH login sessions it is a large company and the administrator does not know if this is normal behavior or if the network is under attack. Where should the administrator look to determine if this is normal behavior?






13. Risk can be managed in the following ways...






14. Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?






15. A remote office is reporting they are unable to access any of the network resources from the main office. The security administrator realizes the error and corrects it. The administrator then tries to ping the router at the remote office and receives






16. Which of the following would be implemented to allow access to services while segmenting access to the internal network?






17. A network administrator is implementing a network addressing scheme that uses a long string of both numbers and alphanumeric characters to create addressing options and avoid duplicates. Which of the following describes a protocol built for this purp






18. You discover that company confidential information is being encoded into graphics files and sent to a destination outside of the company. This is an example of what kind of cryptography?






19. Used in conjunction which of the following are PII?






20. You are designing a secure application environment. You need to ensure that data is kept as secure as possible. You need to select the strictest access control model. What access control model should you use?






21. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






22. An administrator identifies a security issue on but does not attempt to exploit it. Which of the following describes what the administrator has done?






23. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






24. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






25. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






26. Which of the following attacks would password masking help mitigate?






27. Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?






28. Which of the following encryption algorithms can be used in PGP for data encryption?






29. What asymmetric key is used to encrypt when using HTTPS?


30. Which of the following logical controls does a flood guard protect against?






31. The security administrator notices a number of TCP connections from the development department to the test network segregation. Large volumes of data are being transmitted between the two networks only on port 22. Which of the following is MOST likel






32. Which of the following attacks is BEST described as the interruption of network traffic accompanied by the insertion of malicious code?






33. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






34. Which of the following is a reason to perform user awareness and training?






35. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?






36. Which of the following access control models allows classification and labeling of objects?






37. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






38. Which of the following security threats does shredding mitigate?






39. Which of the following is BEST used to prevent ARP poisoning attacks across a network?






40. Which of the following manages peer authentication and key exchange for an IPSec connection?






41. A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?






42. Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?






43. Which of the following is another name for a malicious attacker?






44. A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional pers






45. Which type of virus is able to alter its own code to avoid being detected by anti-virus software?






46. Which of the following devices BEST allows a security administrator to identify malicious activity after it has occurred?






47. An attacker forces a Windows service that uses the Local System account as its service account to crash. The attacker is able to access administrator-level resources as a result. What kind of attack is this?






48. A security administrator finished taking a forensic image of a computer's memory. Which of the following should the administrator do to ensure image integrity?






49. In which of the following locations would a forensic analyst look to find a hooked process?






50. Performing routine security audits is a form of which of the following controls?