CompTIA Security+ SY0-401 (Practice Test)

CompTIA Security+ certification covers network security, compliance and operation security, threats and vulnerabilities as well as application, data and host security. Also included are access control, identity management, and cryptography. The official exam objectives are 1.0 Network Security, 2.0 Compliance and Operational Security, 3.0 Threats and Vulnerabilities, 4.0 Application Data and Host Security, 5.0 Access Control and Identity Management and 6.0 Cryptography.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)
  • Included Objectives:
    • Access Control and Identity Management
    • Network Security
    • Compliance and Operational Security
    • Threats and Vulnerabilities
    • Application, Data and Host Security
    • Cryptography

Sara, a security manager, has decided to force expiration of all company passwords by the close of business day. Which of the following BEST supports this reasoning?

  • Enforcement of password complexity requirements
  • Implementation of configuration management processes
  • Implementation of account lockout procedures.
  • A recent security breach in which passwords were cracked

Which of the following is an example of a physical security measure?

  • Honeypot
  • HIDS
  • NIPS
  • Mantrap

Which of the following is the MOST secure protocol to transfer files?

  • TELNET
  • SSH
  • FTPS
  • FTP

Which of the following application security testing techniques is implemented when an automated system generates random input data?

  • XSRF
  • Fuzzing
  • Input validation
  • Hardening

Company A sends a PGP encrypted file to company B. If company A used company B's public key to encrypt the file, which of the following should be used to decrypt data at company B?

  • Shared key
  • CRLs
  • Private key
  • Public key

Why would your business conduct a penetration test on it's network?

  • To attempt to break security measures, in an effort to fix them.
  • As a final step in security on network, to prove it is safe
  • To passively test network security
  • A business would not do this, it is strictly used for malicious purposes.

Which of the following types of application attacks would be used to specifically gain unauthorized information from databases that did not have any input validation implemented?

  • Buffer overflow and XSS
  • Session hijacking and XML injection
  • Cookies and attachments
  • SQL injection

Tom, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described?

  • Pharming
  • Vishing
  • Phishing
  • Tailgating

Which answer properly describes the purpose of the CA role in Public Key Infrastructure?

  • To issue a certificate
  • To verify keys for authenticity
  • To issue and signs all root certs
  • To sign key escrow lists to CRLs

Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking cookie?

  • Anti-spyware software
  • Anti-spam software
  • Network based firewall
  • Host based firewall

An attacker attempted to compromise a web form by inserting the following input into the username field: admin)(|(password=*)) Which of the following types of attacks was attempted?

  • XSS
  • LDAP injection
  • Command injection
  • SQL injection

Which of the following is the default port and protocol for HTTPS?

  • UDP 25
  • TCP 80
  • UDP 443
  • TCP 25
  • TCP 443

Which of the following BEST explains the use of an HSM within the company servers?

  • Hardware encryption is faster than software encryption.
  • Thumb drives present a significant threat which is mitigated by HSM.
  • Software encryption can perform multiple functions required by HSM.
  • Data loss by removable media can be prevented with DLP.

You are a network administrator for a large business. Recently, you've noticed a large amount of unusual traffic and you suspect they are SYN attacks. What choice will help you defend against these attacks?

  • Spanning Tree Protocol
  • Flood guards
  • VLAN
  • Implicit Deny

An IT director is looking to reduce the footprint of their company's server environment. They have decided to move several internally developed software applications to an alternate environment, supported by an external company. They will still maintain the software, operating systems and configurations, but will not manage the physical hardware. Which of the following BEST describes this arrangement?

  • Platform as a Service
  • Software as a Service
  • Infrastructure as a Service
  • Storage as a Service

Which of the following is a Denial of Service attack using a succession of TCP Handshake requests?

  • Phishing
  • Xmas Attack
  • SYN Flood
  • Smurf Attack

A network administrator has recently updated their network devices to ensure redundancy is in place so that:

  • Single points of failure are removed
  • Switches can redistribute routes across the network
  • Environmental monitoring can be performed
  • Hot and cold aisles are functioning

Your supervisor asked you to open the necessary ports for a 'secure telnet' What ports should you open?

  • TCP 22
  • TCP 69
  • UDP 23
  • TCP 21

Using proximity card readers instead of the traditional key punch doors would help to mitigate:

  • Dumpster diving
  • Tailgating
  • Shoulder surfing
  • Impersonation

A security administrator needs to update the OS on all the switches in the company. Which of the following MUST be done before any actual switch configuration is performed?

  • The request needs to be approved through the incident management process.
  • The request needs to be sent to the revision management team.
  • The request needs to be approved through the change management process.
  • The request needs to be sent to the enterprise management team.