Test your basic knowledge |

Comptia Security + Exam

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A user receives an automated call which appears to be from their bank. The automated recording provides details about the bank's privacy policy security policy and requests that the user clearly state their name - birthday and enter the banking detai






2. What is the term used to describe the type of FTP access in which the user does not have permissions to list the content of directories but can access the contents if he knows the path and file name?






3. Which of the following is the BEST way to secure data for the purpose of retention?






4. Which of the following is used for exchanging secret keys over an insecure public network?






5. Your organization has an existing server and you want to add a hardware device to provide encryption capabilities. What is the easiest way to accomplish this?






6. Separating of duties is valuable in deterring?






7. Which of the following is the MAIN reason to require data labeling?






8. Which of the following are the default ports for HTTP and HTTPS protocols?






9. Which of the following describes the purpose of chain of custody as applied to forensic image retention?






10. Which of the following can prevent an unauthorized employee from entering a data center?






11. Upper management decides which risk to mitigate based on cost. This is an example of:






12. Which of the following is BEST used to prevent ARP poisoning attacks across a network?






13. During the analysis of malicious code a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?






14. Which of the following threats corresponds with an attacker targeting specific employees of a company?






15. Which of the following is MOST relevant to a buffer overflow attack?






16. Which of the following should be reviewed periodically to ensure a server maintains the correct security configuration?






17. Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?






18. Which of the following is used when performing a qualitative risk analysis?






19. In order to provide flexible working conditions a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access?






20. Which of the following environmental variables reduces the potential for static discharges?






21. Risk can be managed in the following ways...






22. An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application's security posture?






23. Which of the following is not an asymmetric system?






24. A network consists of various remote sites that connect back to two main locations. The security administrator needs to block TELNET access into the network. Which of the following by default - would be the BEST choice to accomplish this goal?






25. Which of the following uses TCP port 22 by default?






26. The detection of a NOOP sled is an indication of which of the following attacks?






27. You want to improve security for remote administration to several Linux web servers on the Internet. The data as well as the authentication process needs to be encrypted. Which of the following should you do?






28. The security administrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspicious traffi






29. Which of the following should be enabled to ensure only certain wireless clients can access the network?






30. The 64 bit block cipher with 16 iterations giving a 56 bit key is called?






31. Which of the following is the MOST secure method of utilizing FTP?






32. Which of the following allows a security administrator to set device traps?






33. Which of the following assists in identifying if a system was properly handled during transport?






34. What is the advantage of using application virtualization?






35. Which of the following security threats does shredding mitigate?






36. Which of the following is a method to prevent ad-hoc configuration mistakes?






37. Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?






38. A security administrator is tasked with revoking the access of a terminated employee. Which of the following account policies MUST be enacted to ensure the employee no longer has access to the network?






39. Two systems are being designed. System A has a high availability requirement. System B has a high security requirement with less emphasis on system uptime. Which of the following configurations BEST fits the need for each system?






40. A helpdesk engineer just received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account of the UNIX servers. Although the helpdesk engineer didn't know of any admin






41. Which of the following may cause a user connected to a NAC-enabled network - to not be prompted for credentials?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. Your daily bandwidth monitoring report of your Internet connection shows an excessive amount of outgoing traffic on port 25. You have seen peaks in the reports before but this report shows many peaks outside office times. What should you do?






43. Which of the following is a best practice to identify fraud from an employee in a sensitive position?






44. Which of the following encryption algorithms can be used in PGP for data encryption?






45. Which of the following malware types is MOST commonly installed through the use of thumb drives to compromise systems and provide unauthorized access?






46. Data can potentially be stolen from a disk screen-lock protected - smartphone by which of the following?






47. On-going annual awareness security training should be coupled with:..






48. Which of the following is MOST commonly a part of routine system audits?






49. Which of the following should be performed on a computer to protect the operating system from malicious software?






50. What key is used to encrypt an HTTPS session?