⚡️Lightning Sale: 25% off Lifetime Membership ⚡️

6 hours, 9 minutes remaining!
CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

CompTIA security plus SY0 401 test 4

Free CompTIA Security+ SY0-401 practice test, CompTIA security plus SY0 401 test 4. This free CompTIA Security+ practice exam covers basic knowledge in the field of Information Systems Security. To pass the CompTIA Security+ exam, a candidate will need knowledge in Network Security, Compliance and operational security, threats and vulnerabilities, access control and identity management, cryptography, and application, data, and host security. This free practice test will test your knowledge and readiness for the CompTIA Security+ Examination.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)

You are creating a new network for your company, you only want to purchase one public IP but have many hosts that will be on the network. What will ensure this is possible?

  • PAT

  • HIDS

  • DMZ

  • NAC

A DoS attack can be defined as what?

  • A type of program that infects an OS, and spreads itself across the network.

  • Causing loss of availability to a service, normally by overloading it with large amounts of data.

  • A malicious program that "explodes" or attacks when a specific event happens, such as visiting a certain website.

  • A website disguising itself as another website, in an attempt to steal a username/password combination.

Using programming or scripting in an input field, in an attempt to find a vulnerability, is known as what?

  • Patching

  • Injection

  • Spoofing

  • Hardening

Why would your business conduct a penetration test on it's network?

  • As a final step in security on network, to prove it is safe

  • A business would not do this, it is strictly used for malicious purposes.

  • To passively test network security

  • To attempt to break security measures, in an effort to fix them.

You have been tasked with finding and installing an enterprise SNMP solution. Which of the following properly describes the purpose and use of SNMP?

  • To transfer emails from server to server, using TCP port 25.

  • Remotely monitor network equipment, such as switches and routers.

  • Automates network configuration settings such as IP address, subnet masks, and default gateways

  • Used to assign ports to private IPs, allowing a network to all use one public IP

Which of the following is not an example of biometric authentication?

  • Voice authentication

  • Smart card

  • Finger print scanner

  • Retina Scanner

Which of the following terms properly describes the term Wardriving?

  • Uses chalk or paint to mark unsecured WAPs

  • Scanning for unsecured WAPs while in a vehicle.

  • Pentesting

  • Port Scanning a wifi network

Which of the following terms describes installing an Operating System inside of a host Operating System?

  • VirtualBox

  • Cloud Computing

  • Container

  • Virtualization

Which of the following protocols is a tunnel encryption used as a secure alternative to telnet?

  • Blowfish

  • TLS

  • SSH

  • SSL

Which of the following terms would be used when configuring a firewall to allow certain traffic to pass unobstructed?

  • Allowing a session

  • Creating an AP

  • Creating an exception

  • Establishing a tunnel

Which of the following standard protocols utilizes the 802.11i standard?

  • WPA2

  • WEP2

  • PNAC

  • WEP

Which of the following terms involves the sending and receiving of unsolicited messages over Bluetooth?

  • Bluesnarfing

  • Phishing

  • BlueJacking

  • Spim

A network or host designed to attract malicious users away from actual sensitive materials, is known as what?

  • Honeypot

  • Rogue access point

  • Botnet

  • Black box

Which networking device makes it very easy for a malicious user to receive and save packets that were not intended for their workstation?

  • Bridge

  • Switch

  • HUB

  • Router

Which of the following choices can be described as a type of social engineering?

  • MAC Spoofing

  • DDoS

  • Vishing

  • Xmas Attack

PKI uses what type of encryption?

  • Symmetric

  • Asymmetric

Several high level executives at a business have been targeted by phishing attacks. Which of the following terms describes this type of phishing?

  • Phreaking

  • Whaling

  • Pharming

  • Tailgaiting

The employees at the company you work for are complaining about receiving a lot of emails advertising services and goods. What are they experiencing?

  • Bluesnarfing

  • Phishing

  • Whaling

  • Spam

Which of the following descriptions best defines the principle of implicit deny?

  • Allow all traffic

  • Deny all traffic unless explicitly granted access

  • Deny all traffic

  • None of the above

Which of the following options can be used to verify data integrity?

  • RAID 0

  • MD5

  • AES

  • Blowfish



Remaining Time 00:15:00